Week Seven: Managing Knowledge
Information Resource Management
IT620
February 22, 2014
Running head: MANAGING KNOWLEDGE 1
MANAGING KNOWLEDGE 3
MANAGING KNOWLEDGE 2
Managing Knowledge
Chapter 14: Question 3. How do human capital, structural capital, and customer capital differ?
ANSWER.
Human capital, structural capital and customer capital are three basic fundamentals of any organization. They differ in their roles playing for that organization. Human capital is the efficiency of a human being on the basis of its skills; more the human is skilled and efficient results in more human capital. On the structural capital is the efficiency of the organizations to provide environment in which they can increase the efficiencies of humans working for them such as data, systems, knowledge and designs. The customer capital is the relationship bond with organization products, stronger the bond between the customer and the products results in a stronger customer capital.
Chapter 14: Question 8. What approach did the energy company take to encourage knowledge sharing among its 15 business units?
ANSWER.
The approach that the energy company took to encourage sharing among its 15 business units was establishing peer groups from various units. The idea was to have employees share his or her knowledge without the involvement of leadership to avoid political aspects. Since this was unsuccessful it was decided to provide a human portal for employees where they can ask questions regarding the problems they faced with their customers and employees from other business units provides a solution to them, its kind knowledge sharing between the organizations from different business units. They also gave a chance to their employees to meet with the other employees from different business unit so that they share their experience for the growth of their particular business unit.
Chapter 14: Question 10. What three questions does Stewart recommend be asked before launching a knowledge management project?
ANSWER
The three questions that Stewart recommends to be asked before launching a knowledge management project are listed as follows:
Listing out the group that will use this knowledge space and make them responsible for all the content they are going to post on that knowledge space.
The type of knowledge groups was going to share on the knowledge space and who will manage the context that the employees were discussed on the knowledge space.
He also raises the question of the culture that the organization is going to adopt, will that be composed of reusers or originators because he stated both are different because a repository of things promotes a reuse culture; an online chat room helps originators, but this is not going to happen opposite.
Week 7 - Managing Knowledge
Due Date: Sat, Feb 22, 2014 11:55 PM MST
Write answers to the following textbook questions located at the end of each chapter. Each answer should be approximately 70 words, or a total of appr.
Read 290 Critical Reading as Critical ThinkingOnlineWeek .docxcatheryncouper
Read 290: Critical Reading as Critical Thinking
Online
Week 6
This week you will be taking the quiz covering chapters 1 through 5 from the ARQ text. You will also be taking Exam #1 on Friday. The following checklist should help you to stay organized and focused on your online assignments.
Week 6 – Checklist
1. View the Week 6 video announcement or Read the Week 6 announcement to get an overview of this week’s assignments.
2. Take the quiz on Chapters 1 through 5 in the ARQ text. The quiz consists of 25 multiple choice and true/false questions. It should not take more than 1 hour to complete. The quiz is due by Wednesday at 11:59pm.
3. Prepare for Exam #1 by completing the following steps:
a) Read the article “It’s a Job for Parents, Not the Government”
b) View the Exam 1 – Sample Analysis Presentation
4. Take Exam #1. The exam will be available from 12:00am until 11:55pm on Friday. You will have 2 hours to complete the exam. You will need to complete the following steps:
a) Read the Exam 1 Article
b) Analyze the article by completing the Exam 1 Worksheet
c) Access and complete the Exam. Use your worksheet to answer the questions about the article. Then submit your exam.
d) Submit your worksheet using the link provided in the week 6 section of TITANium. You must submit your worksheet to get credit for this exam.
Good luck!
Week Seven: Managing Knowledge
Information Resource Management
IT620
February 22, 2014
Running head: MANAGING KNOWLEDGE 1
MANAGING KNOWLEDGE 3
MANAGING KNOWLEDGE 2
Managing Knowledge
Chapter 14: Question 3. How do human capital, structural capital, and customer capital differ?
ANSWER.
Human capital, structural capital and customer capital are three basic fundamentals of any organization. They differ in their roles playing for that organization. Human capital is the efficiency of a human being on the basis of its skills; more the human is skilled and efficient results in more human capital. On the structural capital is the efficiency of the organizations to provide environment in which they can increase the efficiencies of humans working for them such as data, systems, knowledge and designs. The customer capital is the relationship bond with organization products, stronger the bond between the customer and the products results in a stronger customer capital.
Chapter 14: Question 8. What approach did the energy company take to encourage knowledge sharing among its 15 business units?
ANSWER.
The approach that the energy company took to encourage sharing among its 15 business units was establishing peer groups from various units. The idea was to have employees share his or her knowledge without the involvement of leadership to avoid political aspects. Since this was unsuccessful it was decided to provide a human portal for employees where they can ask questions regarding the problems they faced with their customers and employees from other business units provides a solution to them, its kind ...
knowledge management detailed document - meaning , types, knowledge management system lifecycle, Nonaka,s model , KM myths, KM cycle, KM Audit, km matrix, km components , Knowledge application system, Knowledge capture system, Knowledge sharing system, Knowledge discovery system, codification, personalization , 5ikm3 maturity model , CMM maturity model,1. Distinguish between brainstorming and consensus decision making
2. Protocol analysis and Delphi method
3. Repertory guard and nominal group
4. Black boarding and electronic brain storming
Knowledge Sharing in Workplace: Motivators and DemotivatorsIJMIT JOURNAL
This paper gives an overview of knowledge sharing in workplace. Based on the review of critical literatures by the authors, they infer that knowledge sharing in workplace can be influenced by motivators and
demotivators. Activities of knowledge sharing in organizations may be on organization level or individual
level. Knowledge sharing of both levels is critical to the success or failure of knowledge management inside
and outside of organizations. Age, culture, and industry were all found to affect knowledge sharing among workers. A common stereotype is that older workers hoard knowledge because they are more insecure and feel threatened by younger workers. Since older workers have more valuable knowledge, younger workers
needed to entice their older colleagues to share their valuable knowledge with them. The paper focus on
motivators and demotivators to sharing Knowledge in workplace. Theories and research pertaining to why
workers share knowledge are reviewed. While all industry need knowledge and innovation, it is also true
that the pace of change and the need to innovate differs from industry to industry. Technology was
acknowledged to have a high important role in increasing productivity of knowledge sharing. It plays a critical role in creating, storing and distributing explicit knowledge in an accessible and expeditious manner.
Read 290 Critical Reading as Critical ThinkingOnlineWeek .docxcatheryncouper
Read 290: Critical Reading as Critical Thinking
Online
Week 6
This week you will be taking the quiz covering chapters 1 through 5 from the ARQ text. You will also be taking Exam #1 on Friday. The following checklist should help you to stay organized and focused on your online assignments.
Week 6 – Checklist
1. View the Week 6 video announcement or Read the Week 6 announcement to get an overview of this week’s assignments.
2. Take the quiz on Chapters 1 through 5 in the ARQ text. The quiz consists of 25 multiple choice and true/false questions. It should not take more than 1 hour to complete. The quiz is due by Wednesday at 11:59pm.
3. Prepare for Exam #1 by completing the following steps:
a) Read the article “It’s a Job for Parents, Not the Government”
b) View the Exam 1 – Sample Analysis Presentation
4. Take Exam #1. The exam will be available from 12:00am until 11:55pm on Friday. You will have 2 hours to complete the exam. You will need to complete the following steps:
a) Read the Exam 1 Article
b) Analyze the article by completing the Exam 1 Worksheet
c) Access and complete the Exam. Use your worksheet to answer the questions about the article. Then submit your exam.
d) Submit your worksheet using the link provided in the week 6 section of TITANium. You must submit your worksheet to get credit for this exam.
Good luck!
Week Seven: Managing Knowledge
Information Resource Management
IT620
February 22, 2014
Running head: MANAGING KNOWLEDGE 1
MANAGING KNOWLEDGE 3
MANAGING KNOWLEDGE 2
Managing Knowledge
Chapter 14: Question 3. How do human capital, structural capital, and customer capital differ?
ANSWER.
Human capital, structural capital and customer capital are three basic fundamentals of any organization. They differ in their roles playing for that organization. Human capital is the efficiency of a human being on the basis of its skills; more the human is skilled and efficient results in more human capital. On the structural capital is the efficiency of the organizations to provide environment in which they can increase the efficiencies of humans working for them such as data, systems, knowledge and designs. The customer capital is the relationship bond with organization products, stronger the bond between the customer and the products results in a stronger customer capital.
Chapter 14: Question 8. What approach did the energy company take to encourage knowledge sharing among its 15 business units?
ANSWER.
The approach that the energy company took to encourage sharing among its 15 business units was establishing peer groups from various units. The idea was to have employees share his or her knowledge without the involvement of leadership to avoid political aspects. Since this was unsuccessful it was decided to provide a human portal for employees where they can ask questions regarding the problems they faced with their customers and employees from other business units provides a solution to them, its kind ...
knowledge management detailed document - meaning , types, knowledge management system lifecycle, Nonaka,s model , KM myths, KM cycle, KM Audit, km matrix, km components , Knowledge application system, Knowledge capture system, Knowledge sharing system, Knowledge discovery system, codification, personalization , 5ikm3 maturity model , CMM maturity model,1. Distinguish between brainstorming and consensus decision making
2. Protocol analysis and Delphi method
3. Repertory guard and nominal group
4. Black boarding and electronic brain storming
Knowledge Sharing in Workplace: Motivators and DemotivatorsIJMIT JOURNAL
This paper gives an overview of knowledge sharing in workplace. Based on the review of critical literatures by the authors, they infer that knowledge sharing in workplace can be influenced by motivators and
demotivators. Activities of knowledge sharing in organizations may be on organization level or individual
level. Knowledge sharing of both levels is critical to the success or failure of knowledge management inside
and outside of organizations. Age, culture, and industry were all found to affect knowledge sharing among workers. A common stereotype is that older workers hoard knowledge because they are more insecure and feel threatened by younger workers. Since older workers have more valuable knowledge, younger workers
needed to entice their older colleagues to share their valuable knowledge with them. The paper focus on
motivators and demotivators to sharing Knowledge in workplace. Theories and research pertaining to why
workers share knowledge are reviewed. While all industry need knowledge and innovation, it is also true
that the pace of change and the need to innovate differs from industry to industry. Technology was
acknowledged to have a high important role in increasing productivity of knowledge sharing. It plays a critical role in creating, storing and distributing explicit knowledge in an accessible and expeditious manner.
Are organizations likely to find better solutions to information o.docxrossskuddershamus
Are organizations likely to find better solutions to information overload through changes to theirtechnical systemsor their social systems -- or both? Why?
Abstract
This paper argues for the relevance and utility of socio-technical theory for designing solutions to the challenges we face from managing the impact of information overload. A consequence of information overload can cause serious damage to an organization performance.
Socio-technical systems theory defines systems as a collection of messy, complex, problem-solving components. This approach suggests a balance between the social and technical systems which together make up an organization. The paper suggests that socio-technical approach, purport that in order for organizations to create and store their knowledge they must consider the balance between the social and technical systems which make up an organization. Effective knowledge management is a combination of the appropriate use of technology in each stage with the humanistic use of people within the organizations. A socio-technical framework for knowledge management is therefore an appropriate way of dealing with the problem of information overload.
Social-Technical Perspective: A solution for Managing Information Overload
We live in the information age. And we work in it, too. Our work environment today, has access to more tools than ever before to help facilitate communication. It is true that all these new tools provide numerous arrays of options for keeping employees informed, connected, productive and engaged. Hence the explosive development of the Internet and related information and communication technologies has brought into focus the problems of information overload, and the growing speed and complexity of developments in society. People find it ever more difficult to cope with all the new information they receive, constant changes in the organizations and technologies they use, and increasingly complex and unpredictable side-effects of their actions. This leads to growing stress and anxiety (Blair, 2010). In terms of business stand point, the information clutter that is associated with these new technological advancements is making it difficult for many employees to understand organizational priorities and focus on the work that is most critical to achieving business objectives.
As suggested in the module introduction, socio-technical design can be very helpful in diagnosing Information overload that can typically exists in some pockets of an organization, while other pockets may not receive enough information. It's critical to identify precisely where and to what extent this challenge exists in an organization.
It is important to understand that nothing is possible without knowledge. Knowledge can be defined as a mix of framed experience, values, contextual information, and expert insight that provides a framework for evaluating and incorporating new experiences and information. It originates and is applied in.
An Analytical Study on Knowledge Sharing within the Organizationijcnes
The better management of knowledge within the organization will lead to improved innovation and competitive advantage. The main goal of the firm� better utilization of internal and external knowledge. This core knowledge is found in individuals, communities of interest and their connections. An organization�s data is found in its computer systems but a company�s intelligence is found, in its biological and social systems. Though it is acclaimed as a good method, there are some setbacks in the process of knowledge sharing[KS] among the employees. This paper explores the possible ways to establish organization using social computing tools to facilitate Knowledge Sharing and create a social data mining among all the members of organization. Social Data Mining Network Analysis (SDMNA) techniques have been used to study KS patterns which take place between employees and departments. This SDMNA graph reveals the structure of social data mining network highlighting connectivity, clustering and strength of relationships between employees.
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...ijistjournal
Learning comes through creating and applying knowledge, whilst learning increases an individual's and organization's knowledge asset. Both e-learning and knowledge management feed off the same root: learning, improved capacity to perform work tasks, ability to make effective decisions, and positively impact the world around us. The difference between KM and e-learning is a function of time; knowledge management is dynamic, e-learning is static. As a medium, e-learning allows for the sharing of knowledge that has been tested, researched and organized. Knowledge management is much livelier. Conversations and sharing understanding happens in real time. Through KM, tacit understanding can be communicated, problems can be jointly solved, and serendipitous connections are formed. KM is chaotic, current. KM is ecology; e-learning is the architecture. E-learning courses become outdated, while KM environments are continually fresh and reflective of current activity in a field. Anyway, the strengths of the two fields need to be brought together. KM should feed into e-learning in order for the content of the "course" to remain fresh and to tap learners into a sustained knowledge environment after the course is done and e-learning should feed into the KM environment to provide easy mechanisms for organizing information in the manner that most of the people function. There‟s no doubt that converging this two technology creates bigger impact in the learning process, but our discussion is focused to justify whether the convergence creates better value or not. In the light of the discussion, the conceptual link between these two key technologies has been drawn and several related issues are discussed.
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...ijistjournal
Learning comes through creating and applying knowledge, whilst learning increases an individual's and organization's knowledge asset. Both e-learning and knowledge management feed off the same root: learning, improved capacity to perform work tasks, ability to make effective decisions, and positively impact the world around us. The difference between KM and e-learning is a function of time; knowledge management is dynamic, e-learning is static. As a medium, e-learning allows for the sharing of knowledge that has been tested, researched and organized. Knowledge management is much livelier. Conversations and sharing understanding happens in real time. Through KM, tacit understanding can be communicated,problems can be jointly solved, and serendipitous connections are formed. KM is chaotic, current. KM is ecology; e-learning is the architecture. E-learning courses become outdated, while KM environments are continually fresh and reflective of current activity in a field. Anyway, the strengths of the two fields need to be brought together. KM should feed into e-learning in order for the content of the "course" to remain fresh and to tap learners into a sustained knowledge environment after the course is done and e-learning should feed into the KM environment to provide easy mechanisms for organizing information in the manner that most of the people function. Thereis no doubt that converging this two technology creates bigger impact in the learning process, but our discussion is focused to justify whether the convergence creates better value or not. In the light of the discussion, the conceptual link between these two key technologies has been drawn and several related issues are discussed.3.
Professional knowledge and the management of it is important to building a sustainable and competitive business.
For more content like this, check out Acorn Labs: https://acornlms.com/enterprise-learning-management
With regards to this article, I agree and disagree on certain leve.docxalanfhall8953
With regards to this article, I agree and disagree on certain levels pertaining to racism in video games. I have been playing video games since the Nintendo days and I have noticed many stereotypes in video games that Evan has pointed out. Although Evan feels that all black characters are subject to stereotypes, there are bunches of game characters that I believe are not under this category and are in fact very ambitious characters. For example, Lee Everett from the Walking Dead: Season 1 game, Captain Anderson from the Mass Effect Trilogy, Franklin from Grand Theft Auto V and Sgt. Johnson from the Halo series. The problem I have with Evan's critique is the fact that he is judging black characters based on how they act and look, something that society does to members of the visible minority in the real world. Majority of the characters that are in question may seem stereotypical at first but if you delve deeper into their character you start to realize that there is depth behind that person rather than just big muscles and a loud mouth. In my opinion, whenever I play a video game I can care less what the race of my character is and I look more towards their development as a character and the story that it is telling. Many "gamers" share this same opinion from research I have done and even in the comment section of this article. I get the notion that he is looking for a character that is "white" but the problem is whenever a black character is given the same characteristics as a white character, they are not well received and are made fun of for being "white washed". There seems to be a double standard with how black characters are portrayed and is also something that will unfortunately never be able to appease to everyone due to the fact that everyone shares a different opinion on how certain types of characters should be portrayed.
3/25/2014
1/11
The Social Construction of "Race"
As our discussions have revealed over the past few weeks, negative or stereotypical representation in media
has real consequences. Such representations not only reflect but also reinforce the marginality of minority
groups. Thus, it follows that the political empowerment of subordinate groups in society--such as women,
youth, people with disabilities, gays and lesbians, the poor--depends in part on changing the way these
groups are represented.
How can we think about the issues of representation and empowerment in relation to racial minorities? First,
we need to gain a better understanding of the social construction of racial and ethnic identity.
Ethnicity
'Ethnicity' and 'race' are linked but distinct categories. Ethnicity is a broad social category that addresses
one’s perceived membership in a larger group based on an attachment to an actual or possible homeland, its
cultural heritage, belief system, political history, language, myths, customs, manners, food, literature, sport, art
or architectural style. Ethnic affiliations are acknowledged and pa.
WIT Financial Accounting Test Chapters 5 and 6
1. From the adjusted trial balance for Worker Products Company given below, prepare a multiple-step income statement in good form.
Worker Products Company
Adjusted Trial Balance
December 31
Debit
Credit
Cash
$9,400
Accounts receivable
25,000
Merchandise inventory
36,000
Office supplies
900
Store equipment
75,000
Accumulated depreciation - store equipment
$22,000
Office equipment
60,000
Accumulated depreciation -office equipment
15,000
Accounts payable
42,000
Notes payable
10,000
F. Worker, Capital
110,700
F. Worker, Withdrawals
48,000
Sales
325,000
Sales discounts
6,000
Sales returns and allowances
16,500
Cost of goods sold
195,000
Sales salaries expense
32,500
Depreciation expense - store equipment
11,000
Depreciation expense - office equipment
7,500
Office supplies expense
1,300
Interest expense
600
Totals
$524,700
$524,700
2. From the adjusted trial balance for Worker Products Company given below, prepare the necessary closing entries.
Worker Products Company
Adjusted Trial Balance
December 31
Debit
Credit
Cash
$9,400
Accounts receivable
25,000
Merchandise inventory
36,000
Office supplies
900
Store equipment
75,000
Accumulated depreciation - store equipment
$22,000
Office equipment
60,000
Accumulated depreciation -office equipment
15,000
Accounts payable
42,000
Notes payable
10,000
F. Worker, Capital
110,700
F. Worker, Withdrawals
48,000
Sales
325,000
Sales discounts
6,000
Sales returns and allowances
16,500
Cost of goods sold
195,000
Sales salaries expense
32,500
Depreciation expense - store equipment
11,000
Depreciation expense - office equipment
7,500
Office supplies expense
1,300
Interest expense
600
Totals
$524,700
$524,700
3. A company made the following merchandise purchases and sales during the month of May:
May 1
Purchased
380 units at
$15 each
May 5
Purchased
270 units at
$17 each
May 10
Sold
400 units at
$50 each
May 20
Purchased
300 units at
$22 each
May 25
Sold
400 units at
$50 each
There was no beginning inventory. If the company uses the LIFO periodic inventory method, what would be the cost of the ending inventory?
4. A company made the following merchandise purchases and sales during the month of May:
May 1
Purchased
380 units at
$15 each
May 5
Purchased
270 units at
$17 each
May 10
Sold
400 units at
$50 each
May 20
Purchased
300 units at
$22 each
May 25
Sold
400 units at
$50 each
There was no beginning inventory. If the company uses the FIFO periodic inventory method, what would be the cost of the ending inventory?
5. Flaxco purchases inventory from overseas and incurs the following costs: the cost of the merchandise is $50,000, credit terms are 2/10, n/30 that apply only to the $50,000; FOB shipping point freight charges are $1,500; insurance during transit is $500; and import duties .
More Related Content
Similar to Week Seven Managing KnowledgeInformation Resourc.docx
Are organizations likely to find better solutions to information o.docxrossskuddershamus
Are organizations likely to find better solutions to information overload through changes to theirtechnical systemsor their social systems -- or both? Why?
Abstract
This paper argues for the relevance and utility of socio-technical theory for designing solutions to the challenges we face from managing the impact of information overload. A consequence of information overload can cause serious damage to an organization performance.
Socio-technical systems theory defines systems as a collection of messy, complex, problem-solving components. This approach suggests a balance between the social and technical systems which together make up an organization. The paper suggests that socio-technical approach, purport that in order for organizations to create and store their knowledge they must consider the balance between the social and technical systems which make up an organization. Effective knowledge management is a combination of the appropriate use of technology in each stage with the humanistic use of people within the organizations. A socio-technical framework for knowledge management is therefore an appropriate way of dealing with the problem of information overload.
Social-Technical Perspective: A solution for Managing Information Overload
We live in the information age. And we work in it, too. Our work environment today, has access to more tools than ever before to help facilitate communication. It is true that all these new tools provide numerous arrays of options for keeping employees informed, connected, productive and engaged. Hence the explosive development of the Internet and related information and communication technologies has brought into focus the problems of information overload, and the growing speed and complexity of developments in society. People find it ever more difficult to cope with all the new information they receive, constant changes in the organizations and technologies they use, and increasingly complex and unpredictable side-effects of their actions. This leads to growing stress and anxiety (Blair, 2010). In terms of business stand point, the information clutter that is associated with these new technological advancements is making it difficult for many employees to understand organizational priorities and focus on the work that is most critical to achieving business objectives.
As suggested in the module introduction, socio-technical design can be very helpful in diagnosing Information overload that can typically exists in some pockets of an organization, while other pockets may not receive enough information. It's critical to identify precisely where and to what extent this challenge exists in an organization.
It is important to understand that nothing is possible without knowledge. Knowledge can be defined as a mix of framed experience, values, contextual information, and expert insight that provides a framework for evaluating and incorporating new experiences and information. It originates and is applied in.
An Analytical Study on Knowledge Sharing within the Organizationijcnes
The better management of knowledge within the organization will lead to improved innovation and competitive advantage. The main goal of the firm� better utilization of internal and external knowledge. This core knowledge is found in individuals, communities of interest and their connections. An organization�s data is found in its computer systems but a company�s intelligence is found, in its biological and social systems. Though it is acclaimed as a good method, there are some setbacks in the process of knowledge sharing[KS] among the employees. This paper explores the possible ways to establish organization using social computing tools to facilitate Knowledge Sharing and create a social data mining among all the members of organization. Social Data Mining Network Analysis (SDMNA) techniques have been used to study KS patterns which take place between employees and departments. This SDMNA graph reveals the structure of social data mining network highlighting connectivity, clustering and strength of relationships between employees.
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...ijistjournal
Learning comes through creating and applying knowledge, whilst learning increases an individual's and organization's knowledge asset. Both e-learning and knowledge management feed off the same root: learning, improved capacity to perform work tasks, ability to make effective decisions, and positively impact the world around us. The difference between KM and e-learning is a function of time; knowledge management is dynamic, e-learning is static. As a medium, e-learning allows for the sharing of knowledge that has been tested, researched and organized. Knowledge management is much livelier. Conversations and sharing understanding happens in real time. Through KM, tacit understanding can be communicated, problems can be jointly solved, and serendipitous connections are formed. KM is chaotic, current. KM is ecology; e-learning is the architecture. E-learning courses become outdated, while KM environments are continually fresh and reflective of current activity in a field. Anyway, the strengths of the two fields need to be brought together. KM should feed into e-learning in order for the content of the "course" to remain fresh and to tap learners into a sustained knowledge environment after the course is done and e-learning should feed into the KM environment to provide easy mechanisms for organizing information in the manner that most of the people function. There‟s no doubt that converging this two technology creates bigger impact in the learning process, but our discussion is focused to justify whether the convergence creates better value or not. In the light of the discussion, the conceptual link between these two key technologies has been drawn and several related issues are discussed.
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...ijistjournal
Learning comes through creating and applying knowledge, whilst learning increases an individual's and organization's knowledge asset. Both e-learning and knowledge management feed off the same root: learning, improved capacity to perform work tasks, ability to make effective decisions, and positively impact the world around us. The difference between KM and e-learning is a function of time; knowledge management is dynamic, e-learning is static. As a medium, e-learning allows for the sharing of knowledge that has been tested, researched and organized. Knowledge management is much livelier. Conversations and sharing understanding happens in real time. Through KM, tacit understanding can be communicated,problems can be jointly solved, and serendipitous connections are formed. KM is chaotic, current. KM is ecology; e-learning is the architecture. E-learning courses become outdated, while KM environments are continually fresh and reflective of current activity in a field. Anyway, the strengths of the two fields need to be brought together. KM should feed into e-learning in order for the content of the "course" to remain fresh and to tap learners into a sustained knowledge environment after the course is done and e-learning should feed into the KM environment to provide easy mechanisms for organizing information in the manner that most of the people function. Thereis no doubt that converging this two technology creates bigger impact in the learning process, but our discussion is focused to justify whether the convergence creates better value or not. In the light of the discussion, the conceptual link between these two key technologies has been drawn and several related issues are discussed.3.
Professional knowledge and the management of it is important to building a sustainable and competitive business.
For more content like this, check out Acorn Labs: https://acornlms.com/enterprise-learning-management
Similar to Week Seven Managing KnowledgeInformation Resourc.docx (20)
With regards to this article, I agree and disagree on certain leve.docxalanfhall8953
With regards to this article, I agree and disagree on certain levels pertaining to racism in video games. I have been playing video games since the Nintendo days and I have noticed many stereotypes in video games that Evan has pointed out. Although Evan feels that all black characters are subject to stereotypes, there are bunches of game characters that I believe are not under this category and are in fact very ambitious characters. For example, Lee Everett from the Walking Dead: Season 1 game, Captain Anderson from the Mass Effect Trilogy, Franklin from Grand Theft Auto V and Sgt. Johnson from the Halo series. The problem I have with Evan's critique is the fact that he is judging black characters based on how they act and look, something that society does to members of the visible minority in the real world. Majority of the characters that are in question may seem stereotypical at first but if you delve deeper into their character you start to realize that there is depth behind that person rather than just big muscles and a loud mouth. In my opinion, whenever I play a video game I can care less what the race of my character is and I look more towards their development as a character and the story that it is telling. Many "gamers" share this same opinion from research I have done and even in the comment section of this article. I get the notion that he is looking for a character that is "white" but the problem is whenever a black character is given the same characteristics as a white character, they are not well received and are made fun of for being "white washed". There seems to be a double standard with how black characters are portrayed and is also something that will unfortunately never be able to appease to everyone due to the fact that everyone shares a different opinion on how certain types of characters should be portrayed.
3/25/2014
1/11
The Social Construction of "Race"
As our discussions have revealed over the past few weeks, negative or stereotypical representation in media
has real consequences. Such representations not only reflect but also reinforce the marginality of minority
groups. Thus, it follows that the political empowerment of subordinate groups in society--such as women,
youth, people with disabilities, gays and lesbians, the poor--depends in part on changing the way these
groups are represented.
How can we think about the issues of representation and empowerment in relation to racial minorities? First,
we need to gain a better understanding of the social construction of racial and ethnic identity.
Ethnicity
'Ethnicity' and 'race' are linked but distinct categories. Ethnicity is a broad social category that addresses
one’s perceived membership in a larger group based on an attachment to an actual or possible homeland, its
cultural heritage, belief system, political history, language, myths, customs, manners, food, literature, sport, art
or architectural style. Ethnic affiliations are acknowledged and pa.
WIT Financial Accounting Test Chapters 5 and 6
1. From the adjusted trial balance for Worker Products Company given below, prepare a multiple-step income statement in good form.
Worker Products Company
Adjusted Trial Balance
December 31
Debit
Credit
Cash
$9,400
Accounts receivable
25,000
Merchandise inventory
36,000
Office supplies
900
Store equipment
75,000
Accumulated depreciation - store equipment
$22,000
Office equipment
60,000
Accumulated depreciation -office equipment
15,000
Accounts payable
42,000
Notes payable
10,000
F. Worker, Capital
110,700
F. Worker, Withdrawals
48,000
Sales
325,000
Sales discounts
6,000
Sales returns and allowances
16,500
Cost of goods sold
195,000
Sales salaries expense
32,500
Depreciation expense - store equipment
11,000
Depreciation expense - office equipment
7,500
Office supplies expense
1,300
Interest expense
600
Totals
$524,700
$524,700
2. From the adjusted trial balance for Worker Products Company given below, prepare the necessary closing entries.
Worker Products Company
Adjusted Trial Balance
December 31
Debit
Credit
Cash
$9,400
Accounts receivable
25,000
Merchandise inventory
36,000
Office supplies
900
Store equipment
75,000
Accumulated depreciation - store equipment
$22,000
Office equipment
60,000
Accumulated depreciation -office equipment
15,000
Accounts payable
42,000
Notes payable
10,000
F. Worker, Capital
110,700
F. Worker, Withdrawals
48,000
Sales
325,000
Sales discounts
6,000
Sales returns and allowances
16,500
Cost of goods sold
195,000
Sales salaries expense
32,500
Depreciation expense - store equipment
11,000
Depreciation expense - office equipment
7,500
Office supplies expense
1,300
Interest expense
600
Totals
$524,700
$524,700
3. A company made the following merchandise purchases and sales during the month of May:
May 1
Purchased
380 units at
$15 each
May 5
Purchased
270 units at
$17 each
May 10
Sold
400 units at
$50 each
May 20
Purchased
300 units at
$22 each
May 25
Sold
400 units at
$50 each
There was no beginning inventory. If the company uses the LIFO periodic inventory method, what would be the cost of the ending inventory?
4. A company made the following merchandise purchases and sales during the month of May:
May 1
Purchased
380 units at
$15 each
May 5
Purchased
270 units at
$17 each
May 10
Sold
400 units at
$50 each
May 20
Purchased
300 units at
$22 each
May 25
Sold
400 units at
$50 each
There was no beginning inventory. If the company uses the FIFO periodic inventory method, what would be the cost of the ending inventory?
5. Flaxco purchases inventory from overseas and incurs the following costs: the cost of the merchandise is $50,000, credit terms are 2/10, n/30 that apply only to the $50,000; FOB shipping point freight charges are $1,500; insurance during transit is $500; and import duties .
Windows Server Deployment ProposalOverviewEach student will .docxalanfhall8953
Windows Server Deployment Proposal
Overview
Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.
Scenario
Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WAI with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WAI wishes to implement the “right” solution to fit their needs now and for the next 2-3 years.
There are several details about WAI which will have an impact on your choices:
· WAI will start with 110 employees, in the following departments:
· Executives (9 employees) – manage and run the company
· Accounts and Sales Department (15 employees) – perform market research and maintain accounts
· Creative, Media and Production Department (59 employees) – advertising
· Human Resources and Finances (17 employees) – perform HR and financial duties
· IT (10 employees) – manage IT for the company
· WAI will have two sites, one in Seattle and one in New York. Most staff will be located in Seattle, with at least 1 person from each of the departments above located in NY.
· Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.
· Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
· Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). Your team may make assumptions about how data should be shared or kept private.
· Assumptions can be made regarding any information not included here; all assumptions should be identified, however.
Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.
Describe the technical and business reasons for each choice, citing other resources as appropriate.
The Windows Server 2012 operating system should be used for all aspects of the solution.
The topics inclu.
Willowbrook SchoolBackgroundWillowbrook School is a small, pri.docxalanfhall8953
Willowbrook School
Background
Willowbrook School is a small, private school in the Midwest United States. For the past 20 years, it has offered a curriculum for preschool through 6th grade. Five years ago it expanded to offer after-school care, usually referred to as after care, on premises. After care is not only offered to Willowbrook’s students, but also for students of other schools in the area.
As an independent systems analyst working as a team, you work as an IT consultant, specializing in developing IT solutions for small businesses. You have been contacted by the director, Victoria Owens, to discuss the possibility of setting up a computer system to handle some of the school’s administrative and financial tasks. She explains to you that Willowbrook is experiencing significant increases in enrollment applications for all programs. Increases in applications, coupled with increased demand for after-school care, have led to a very high workload for the administrative personnel and staff. The principal and teachers have stepped in where possible, but the demand is becoming too great. Willowbrook School is a non-profit, and is not in a position to hire another full-time administrative position, which is what the principal and director think would be needed to handle the increased workload. You agree to meet with Victoria and the principal, Kathy Gilliard next week to discuss the school and its need for an information system.
You sit down with Victoria and Kathy on Wednesday to ask them some questions to help you determine what type of information system they need. You explain to them that information systems bring computer hardware and software together with people, processes, and data to produce specific results. They are excited to tell you about their situation and what they have in mind for a computer system to help with some of the work load. To help you with planning for the information system, you ask them about what personnel they have, as well as some questions to determine what types of information each person needs to do their job.
Victoria explains her role as the executive director of the school. She administers the activities of the school in accordance with the mission, vision, and policies established by the Board of Directors. She supports the educational staff and oversees the financial, payroll, and human resources functions for the school. She also prepares all necessary reports and evaluations for the state and local school boards. Kathy says that as the principal of Willowbrook she handles the academic and curricular issues that arise, and ensures that the school meets all federal and state educational standards. Kathy and the teachers who report to her make decisions jointly about admissions and assignments to classrooms. The two kitchen staff personnel, a head cook and an assistant, also report to the principal. She also coordinates students’ bus transportation schedule. The school contracts with a local bussing co.
Wind PowerUsed For Millennia Variations in alb.docxalanfhall8953
Wind Power
Used For Millennia
Variations in albedo
Wind
The Uneven Heating of the Surface
Annual average net radiation from the Earth’s surface 1995 - 1986
Areas of heat gain and loss on Earth’s surface
Re-distribution of Excess Heat
Atmospheric Circulation on a Non-rotating
Earth
One cell in each hemisphere.
Warm air rises at the equator and moves north.
Cool air sinks at the poles and flows toward the equator.
Coriolis Effect
Coriolis Effect: tendency of a fluid (water or air) to be deflected from
its straight-line path as it moves across the Earth’s surface.
Deflection of a moving object is to the Right in the Northern
Hemisphere and Left in the Southern Hemisphere.
High Pressure
High Pressure
Low Pressure
High Pressure
Rising air
Descending air
Low Pressure
Descending Air
Rising air
Low pressure
Descending air
Atmospheric Circulation on a Rotating Earth
InterTropical Convergence Zone
(another source of wind)
Wind Generation
Turbine Blades
Inside of Wind Turbine
Size Scale of Wind Turbines
Small Scale Wind Power (Domestic systems)
Large Scale Wind Power (Grid Systems)
Wind Characteristics
Highly variable at several different timescales:
From hour to hour
Daily
Seasonally
High demand may not correspond to peak winds.
Instantaneous electrical generation and consumption must remain in
balance to maintain the grid stability.
Intermittent winds pose problem for wind power. Backup generation
capacity (fossil fuels) or energy storage (pump storage) may be
needed.
Turbine Size
Domestic size Grid size
Early Wind Farms
Limited output per turbine.
Required large numbers of turbines.
Large Scale Wind Turbines
Note bus
New Wind Turbine Designs
Learning From Nature
Humpback Whale Blade design
Potential Wind Energy Regions
Wind & Water
Ocean wind farm off Denmark
Energy Output Vs. Wind Velocity
Each potential wind farm has its own wind characteristics
Advantages of Wind Power
• No fuel consumed.
• No air pollution.
• Energy used to build a wind power plant equals the
energy produced by the plant in a few months time =
pays for itself.
• Allows for multiple land use in farming and electrical
generation.
Surprising Resistance to Wind Power
Environmental Effects
Danger to birds and bats.
Noisy (whooof, whooof)
Medical problems
Aesthetics (Cape Cod).
Danger to birds and bats
Danger to birds and bats
Birdwatchers in UK flock to see rare
bird, then watch it killed by wind turbine
Bird Friendly Compressed Air
Turbine
Perceived Wind Noise
San Gorgoino Pass, California
Near Palm Springs, popular resort
New Wind Farm Proposal
Cape Cod Wind Farm
Against
Against
Can’t Please Everybody
Artist Rendition of Proposed Cape
Cod Wind Farm
Cape Cod wind farm would not be visible for
more that 7 - 8 months a year due to haze.
Isle of Lewis, Scotland
Isle of Lewis Standing Stones
La Venta,.
winter 2013 235 CREATE A CONTRACTInstructionsI will giv.docxalanfhall8953
winter 2013 235
CREATE A CONTRACT
Instructions:
I will give you a fact scenario below that involves some college students who are having difficulty living together as roommates.
Your task will be to create a contract to solve the problems and issues that the fact pattern raises. Hint I had (sixteen) 16 issues when I did the assignment.
After you create the contract, you will then include around a two page written description about WHY you chose to design the provisions of the contract the way you did.
Your grade will be based on:
1. Whether your contract identifies and solves the problems
2. Whether your contract is realistic
a. (ie a clause that says no roommate shall ever enter the room of another roommate is not practical because what if you hear them yelling for help, or if you haven’t seen them in 14 days.) I want you to think about “loopholes” and the “what if” types of things that can go wrong.
3. Language… Really in this assignment PLEASE pay attention to the words you type because one missing word can make the contract really silly… In last year’s contracts I had someone write… A roommate can eat any food in the apartment that has their name on it… (Great give me a pen and I’ll just put my name on everything).
4. Your explanation, did you have sound reasoning for putting in something in the contract.
5. Following the LAW:… This assignment requires you to have a general understanding of what a contract is and how it works… That is, after all, what we have been studying.
a. Do not include items in your contract that are illegal or are not a contract… For example do not say if the roommate leaves the toilet seat up, they will place their hands on the toilet and have their fingers slammed 10 times by the toilet seat. (That’s not enforceable)
b. Do NOT include something like… If roommate “brion” doesn’t like the punishment he can change it to what he wants, or if I don’t want to follow this rule I don’t have to”… (It is not a contract if one person can CHOOSE to not follow something, It also not a contract when you leave punishments, requirements ect for the “future to be determined”
6. Creativity/problem solving/format of contract
a. You must follow the general format of a contract I have included after the fact scenario… Trust me I am including the sections that ALL your contracts must have for your benefit. It will make organizing it a lot easier for you.
b. You must CHOOSE to write your contract from the viewpoint of one of the four people below or as a disinterested outside party… This is critical because if you are writing the contract from the perspective of one of the people it should FAVOR that person (in a reasonable way), if you are writing as a disinterested third party (an attorney) you should try and be as fair to all as possible.
c. In your explanation tell me from what viewpoint…actually make that your first sentence.
******************************************************************
.
WinEst As 1. Es2. Tassignment stInfo (Esti.docxalanfhall8953
WinEst As
1. Es
2. Ta
ssignment
stInfo (Estim
a. Name
b. Due:
c. Estima
d. Start
e. Estima
f. Rate
i.
ii.
ake Off (Ite
mate Inform
e: Driveway
1 month fro
ate Type: B
Date: Toda
ate Status:
Tables:
Sample L
Sample E
ems)
P
C
mation)
y Proposal
om today
udgetary
ay
Submitted
abor Rates
quipment R
Page 1 of 2
COMPU
Rates
TERS FO
Engi
OR CONS
TEC
neering Tec
Un
Colleg
STRUCTI
CHNOLO
hnology Pro
niversity of To
ge of Engine
ON
OGY
gram
oledo
eering
Page 2 of 2
3. Adding Markups
a. Add Net Markup
i. Name: Overhead and Profit
ii. Type: 15%
b. Add Sales Tax
i. Name: Sales Tax
ii. Type: 6.5%
iii. Restrict this Tax Markup to: Material
4. Print Report
a. Report 1:
i. Sheet View, set Filter to “’95 Div Details”
ii. File -> Print Preview -> Style
1. Layout: Landscape
2. Header/Footer -> Custom Header
a. Left Text (Use Field Tags…)
i. Est Info – Project Name
ii. Est Info – Start Date
iii. Est Info – Due Date
b. Center Text (Use Field Tags…)
i. Est Info – Type
ii. Est Info – Status
c. Right Text
i. Name
ii. Professor Name
iii. Class
iv. Date
b. Report 2:
i. Totals View
ii. File -> Print Preview
1. Ensure the Layout and Headers match Report 1
5. DUE: Monday, April 7, 2014 by 5:00 pm
1
Getting Started with WinEst
Sample Exercise v10.1
Professional Cost Estimating and Budgeting
Things you need to know about WinEst
Pull Down Menus & Tool Bars
There are different ways to view your toolbar in WinEst. Here are 2 examples. If you prefer large toolbar buttons,
select ‘Preferences’ from the ‘Tools’ menu option. Now select the Toolbars option from the displayed list of
preferences. To the right, under ‘Style’, change the Images to ‘Large’. Click OK.
Toolbar - Small Images with Short Text
Toolbar - Large Images with Text
WinEst has pull down menus for each of the following - File, Edit, View, Filters, Tables, Tools, Database, Reports,
Custom, Window and Help. When the mouse is clicked on one of these menu items, a list drops down and the
available commands display for that menu. Scan the menus to see the features available in the WinEst program.
Help
Help is always available. You can select the Contents command on the Help menu or press the F1 key to view
help.
2
Navigating in WinEst
WinEst has three main views. These enable you to follow a structured method for building and reviewing your
estimates. You can move from view to view at any time by clicking one of the corresponding toolbar buttons
(‘Takeoff’, ‘Sheet’ and ‘Totals’) or by making selections from the ‘View’ Menu.
Takeoff View
This view is for adding items to your estimate from the price book Database. From here you can:
• Lookup items in the database
• Perform takeoff calculations
• Assign Work Breakdown Structures (WBS) to items
• Analyze the Item takeoff audit trail
• Enter unique, “one time” items
• Add notes to it.
Wiley Plus Brief Exercise 6 –Accounting 100Brief Exercise 6-1B.docxalanfhall8953
Wiley Plus Brief Exercise 6 –Accounting 100
Brief Exercise 6-1
Brief Exercise 6-1
Farley Company identifies the following items for possible inclusion in the taking of a physical inventory.
Indicate whether each item should be "Included" or "Not Included" from the inventory taking.
(a)
Goods shipped on consignment by Farley to another company.
(b)
Goods in transit from a supplier shipped FOB destination.
(c)
Goods sold but being held for customer pickup.
(d)
Goods held on consignment from another company.
Brief Exercise 6-2
Wilbur Company has the following items:
Indicate whether each item should be "Included" or "Not Included" from the inventory taking.
(a)
Freight-In
(b)
Purchase Returns and Allowances
(c)
Purchases
(d)
Sales Discounts
(e)
Purchase Discounts
Brief Exercise 6-8
Pettit Company reports net income of $90,000 in 2014. However, ending inventory was understated $7,000.
What is the correct net income for 2014?
The correct net income for 2014
$
Warning
Don't show me this message again for the assignment
Ok
Cancel
Click if you would like to Show Work for this question:
Open Show Work
Brief Exercise 6-9 (Part Level Submission)
At December 31, 2014, the following information was available for A. Kamble Company: ending inventory $40,000, beginning inventory $60,000, cost of goods sold $270,000, and sales revenue $380,000.
Warning
Don't show me this message again for the assignment
Ok
Cancel
(a)
Calculate inventory turnover for A. Kamble Company. (Round answer to 1 decimal place, e.g. 1.5.)
Inventory turnover
times
Warning
Don't show me this message again for the assignment
Ok
Cancel
Click if you would like to Show Work for this question:
Open Show Work
Modify Show Work
Exercise 6-1
Tri-State Bank and Trust is considering giving Josef Company a loan. Before doing so, management decides that further discussions with Josef’s accountant may be desirable. One area of particular concern is the inventory account, which has a year-end balance of $297,000. Discussions with the accountant reveal the following.
1.
Josef sold goods costing $38,000 to Sorci Company, FOB shipping point, on December 28. The goods are not expected to arrive at Sorci until January 12. The goods were not included in the physical inventory because they were not in the warehouse.
2.
The physical count of the inventory did not include goods costing $95,000 that were shipped to Josef FOB destination on December 27 and were still in transit at year-end.
3.
Josef received goods costing $22,000 on January 2. The goods were shipped FOB shipping point on December 26 by Solita Co. The goods were not included in the physical count.
4.
Josef sold goods costing $35,000 to Natali Co., FOB destination, on December 30. The goods were received at Natali on January 8. They were not included in Josef's physical inventory.
5.
Josef received goods costing $44,000 on January 2 that were sh.
Winter 2011 • Morality in Education 35Workplace Bullying .docxalanfhall8953
Winter 2011 • Morality in Education 35
Workplace Bullying: Costly and
Preventable
By Terry L Wiedmer
W orkplace bullying is a pervasive practice by malicious individuals who seekpower, control,domination, and subjugation. In businesses or schools, such bullying is an inefficient
way of working that is both costly and preventable. Senior management and executives are
ultimately responsible for creating and sustaining bully-free workplaces. Workplace bullies can be
stopped if employees and employers work together to establish and enforce appropriate workplace
policies and practices. This article presents information about workplace bullying, including its
prevalence, targeted individuals, bullying behaviors, employer practices, and steps to prevent
bullying. In the end, leadership and an environment of respect provide the ultimate formula for
stopping workplace bullying.
Bullying occurs between and among people in all venues—in the home, community, and
workplace. It is a pervasive, targeted, and planned effort that can be overtly obvious or
can fly under the radar and is conducted by practiced and malicious individuals who seek
power, control, domination, and subjugation. The impacts of such actions—in terms of
finances, emotions, health, morale, and overall productivity—are destructive, and the
ramifications are limitless (Mattice, 2009). Because no one is immune from the potential of
being subjected to bullying in the workplace, this topic merits further review and analysis
(Van Dusen, 2008). :
To combat workplace bullying, often referred to as psychological harassment or
violence (Workplace Bullying Institute [WBI], 2007), employers must have a full range of
policies in place and means available to them to create and maintain a healthy workplace
culture and climate. Although they are not generally for-profit endeavors, schools and
school systems are purposeful businesses that share the same concerns and have the same
responsibility to ensure that each employee works in a respectful environment and is not
subjected to workplace bullies.
Workplace Bullying •
According to the Workforce Bullying Institute (WBI), workplace bullying is
the repeated, health-harming mistreatment of one or more persons (the targets)
by one or more perpetrators that takes one or more of the following forms: verbal
abuse; offensive conduct/behaviors (including nonverbal) which are threatening,
humiliating, or intimidating; and work interference—sabotage—which prevents
work from getting done. (Definition of Workplace Bullying, para. 1)
Bullies seek to induce harm, jeopardize one's career and job, and destroy interpersonal
relationships. The behaviors of bullies harm people and ravage profits.
36 The Delta Kappa Gamma Bulletin
Prevalence of Workplace Bullying
Thirty-seven percent of U.S. workforce members report being bullied at work; this amounts
to an estimated 54 million Americans, which translates to nearly the entire population of
the states of Wash.
With the competitive advantage that Crocs’ supply chain holds, the.docxalanfhall8953
With the competitive advantage that Crocs’ supply chain holds, the company also wants to be able to sustain their customers’ satisfaction. In doing this, they must make sure that their transformation process is producing consistent output especially when new products are introduced. This can be achieved by having a solid quality control system.
With the quality control system, inspections are to take place at three critical points. The first one is before production, which involves the raw materials in Crocs’ case that would be the raw materials, or chemicals that they purchase in pellet form. This first step can be eliminated by through supplier certification. The second critical point is during the production process. Process quality control takes place, which involves statistical process control. Periodic samples are taken from a continuous production, as long as sample measurements fall within the control limit the production will continue. However, if the samples fall outside the control limits, the process is stopped and a search is made for an assignable cause. In this case, the process will use a quality control chart known as an attribute control chart. The whole purpose is to find the natural random variability in the output oppose to unnecessary variations. The company must maintain that natural random variability to be under statistical control. The last critical point is after production. Following these inspections is process capability. Process capability is assessed once the process is under statistical control. It is the ability of the process to meet or exceed customers’ specifications. Process capability is determined by using the process capability index. If the process is unable to meet the customer specifications the following step is continuous improvement in which case seven tools are used including a flow chart, check sheet, histogram, Pareto chart, cause and effect, scatter diagram and a control chart. These tools are then incorporated into an improvement approach known as Six Sigma. Six Sigma includes five steps:
1. Defining a process for improvement
2. Measuring the variables and setting goals for improvement
3. Analyzing the root causes in which case the seven tools are referred to
4. Making improvements
5. Implementing a control plan to ensure that changes are permanent
In furthering research on Crocs, it has been stated in online reviews by various customers that they have experienced defects in the seam of their shoes, cases in which their shoe had shrunk or didn’t fit at all, Crocs’ flip flops tearing apart, holes appearing in their shoes, and the smell of the shoes. These reviews are accessible to many consumers, and are capable of tainting the reputation of Crocs. Reviews such as these are important to pay attention to because it’s proof of the importance of solidifying an efficient quality control system. It is especially important when introducing new products, and the use of different materials. .
Wind power resources on the eastern U.S. continental shelf are est.docxalanfhall8953
Wind power resources on the eastern U.S. continental shelf are estimated to be over 400 GW, several times the electricity used by U.S. eastern coastal states. The first U.S. developer proposes to build 130 large (40 story tall) wind turbines in Nan- tucket Sound, just outside Massachusetts state waters. These would provide 420 MW at market prices, enough electricity for most of Cape Cod. The project is opposed by a vigorous and well-financed coalition. Polling shows local public opinion on the project almost equally divided. This article draws on semistructured interviews with residents of Cape Cod to analyze values, beliefs, and logic of supporters and oppo- nents. For example, one value found to lead to opposition is that the ocean is a special place that should be kept natural and free of human intrusion. One line of argument found to lead to support is: The war in Iraq is problematic, this war is “really” over petroleum, Cape Cod generates electricity from oil, therefore, the wind project would improve U.S. security. Based on analysis of the values and reasoning behind our interview data, we identify four issues that are relevant but not currently part of the debate.
Introduction
Recent assessments of renewable energy show that wind power has, since the turn of the century, become cost-competitive in the sites with the most favorable wind regimes (Herzog et al., 2001). Until very recently, large-scale North American wind resources were believed to exist in the Great Plains of the United States, northern Canada, and central Canada only (Grubb & Meyer, 1993). Although these huge resources are enough to meet the entire continent’s electrical needs, they are distant from the large coastal cities where electricity is primarily consumed—imposing a need for costly large-scale transmission lines (Cavallo, 1995). In just the last couple of years, it has been recog- nized that the Atlantic Ocean also has a large wind resource on the continental shelf, close to East Coast cities. Three or four manufacturers have developed large wind elec- tric turbines designed to be placed offshore, in waters up to 20–30 m in depth. To date these have been placed only in European waters. By late 2003, the resources, the tech- nology, and the economic viability had all come together in the Eastern United States, potentially allowing large-scale deployment to begin by 2005.
The furthest advanced of a handful of proposed U.S. offshore wind developments is in Nantucket Sound, off the Southern coast of Cape Cod, Massachusetts. This proposal has engendered a widespread, well-organized, well-financed, and politically potent op- position. This movement’s strength, and the apparent contradiction of such opposition coming from a population thought of as politically liberal and environmentally con- cerned, have garnered national press coverage (e.g., Burkett, 2003). A second project was proposed by the Long Island Power Authority for the southern edge of Long Island, with an .
Wilco Corporation has the following account balances at December 3.docxalanfhall8953
Wilco Corporation has the following account balances at December 31, 2012.
Common stock, $5 par value
$555,600
Treasury stock
90,720
Retained earnings
2,426,200
Paid-in capital in excess of par—common stock
1,321,900
Prepare Wilco’s December 31, 2012, stockholders’ equity section. (For preferred stock, common stock and treasury stock enter the account name only and do not provide the descriptive information provided in the question.)
WILCO CORPORATION
Stockholders’ Equity
December 31, 2012
$
:
$
Sprinkle Inc. has outstanding 10,050 shares of $10 par value common stock. On July 1, 2012, Sprinkle reacquired 107 shares at $89 per share. On September 1, Sprinkle reissued 61 shares at $90 per share. On November 1, Sprinkle reissued 46 shares at $85 per share.
Prepare Sprinkle’s journal entries to record these transactions using the cost method. (If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts. Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Date
Account Titles and Explanation
Debit
Credit
7/1/12
9/1/12
11/1/12
Graves Mining Company declared, on April 20, a dividend of $519,800, on its $5 par common stock, payable on June 1. Of this amount, $133,700 is a return of capital.
Prepare the April 20 and June 1 entries for Graves. (If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts. Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Date
Account Titles and Explanation
Debit
Credit
Apr. 20
June 1
Apr. 20 Retained Earnings = ($519,800 – $133,700) = $386,100
Abernathy Corporation was organized on January 1, 2012. It is authorized to issue 10,290 shares of 8%, $65 par value preferred stock, and 544,000 shares of no-par common stock with a stated value of $2 per share. The following stock transactions were completed during the first year.
Jan. 10
Issued 80,330 shares of common stock for cash at $6 per share.
Mar. 1
Issued 5,670 shares of preferred stock for cash at $113 per share.
Apr. 1
Issued 24,730 shares of common stock for land. The asking price of the land was $90,540; the fair value of the land was $80,330.
May 1
Issued 80,330 shares of common stock for cash at $9 per share.
Aug. 1
Issued 10,290 shares of common stock to attorneys in payment of their bill of $50,620 for services rendered in helping the company organize.
Sept. 1
Issued 10,290 shares of common stock for cash at $11 per share.
Nov. 1
Issued 1,940 shares of preferred stock for cash at $115 per share.
Prepare the journal entries to record the above transactions. (If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts. Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Date
Account Titles and Explanation
Debit
Credit
Jan. 10
M.
Wilson Majee Technology Diffusion, S-Curve, and Innovation.docxalanfhall8953
Wilson Majee
Technology Diffusion, S-Curve, and Innovation-Decision Process
In this week's reflection report I will discuss technology diffusion, S-Curves and innovation
decision process. I will use the healthcare industry as an example. Our healthcare system is ever
evolving - new technologies, insurance models, and information systems are shaping the system
on a daily basis. Despites these changes and the huge healthcare expenditures (16 of GDP in
America compared to 8 in United Kingdom), Americans are comparatively not any healthier
than citizens in most other developed nations (Merson, Black, & Mills, 2012). The disconnect
between investments in technology and health outcomes is a concern of us all. It makes as
question technology diffusion within the healthcare system: are investments in health system
being spent efficiently? Are consumers really resistant to changes that benefit their health? Or
are there issues with technology diffusion as a practice.
Diffusion is the process by which an innovation is spread through a population. Ironically,
people and institutions, generally, do not like change. Change is viewed as painful, difficult and
times creating uncertainties. Because of this, and for the healthcare industry, huge amounts of
resources are devoted either to promoting innovations (for example, selling the latest drug,
imaging system, medical device etc.) or to preventing innovations from disrupting the status quo.
Although many successful healthcare innovations are aimed at making people healthier, at
relatively smaller increases in costs, IT usage in healthcare has always lagged other industries -
ERH are a good example. Adoption of ERH was slow. Literature on technology diffusion states
that successful implementation is influenced by the compatibility and complexity of the
innovation, organizational context, and the characteristics of the implementation strategy (Cain
M, & Mittman, 2002; Rogers, 1995). People respond to these factors differently resulting in an
S-shaped curve illustration of the adoption process.
The S-curve model shows that any innovation is first adopted by a few people/organizations and
as more use it, and confidence is built around the technology, other will begin to use it. Because
of the inherent uncertainty to new innovations, the decision to adopt an innovation takes time.
However, "once the diffusion reaches a level of critical mass, it proceeds rapidly. Eventually a
point is reached where the population is less likely to adopt the innovation, and spread slows
down. The S-curve implies a hierarchy of adopters, starting with innovators, early adopters, early
majority, late majority and laggards (Rogers, 1995). In other words the S-curve explains the
innovation-decision process: the process through which an individual/organization passes
through from when they gain knowledge of an innovation, to forming an attitude, to the decision
to accept or reject the innovation, .
WinARM - Simulating Advanced RISC Machine Architecture
Shuqiang Zhang
Department of Computer Science
Columbia University
New York, NY
[email protected]
Abstract
This paper discusses the design and imple-
mentation of the WinARM, a simulator imple-
mented in C for the Advanced RISC Machine
(ARM) processor. The intended users of this tool
are those individuals interested in learning com-
puter architecture, particularly those with an inter-
est in the Advanced RISC Machine processor fam-
ily.
WinARM facilitates the learning of computer
architecture by offering a hands-on approach to
those who have no access to the actual hardware.
The core of the simulator is implemented in C with
and models a fetch-decode-execute paradigm; a
Visual Basic GUI is included to give users an in-
teractive environment to observe different stages
of the simulation process.
1. Introduction:
This paper describes how to simulate an
ARM processor using the C programming lan-
guage. In the course of this discussion, the reader
is introduced to the details of the ARM processor
architecture and discovers how the hardware
specifications are simulated in software using
execution-driven simulation. Execution driven
simulation is also know as instruction-level simu-
lation, register-cycle simulation or cycle-by-cycle
simulation [3]. Instruction level simulation con-
sists of fetch, decode and execution phases [4].
ARM processors were first designed and
manufactured by Acorn Computer Group in the
mid 1980’s [1]. Due to its high performance and
power efficiency, ARM processors can be found
on wide range of electronic devices, such as Sony
Playstation, Nintendo Game Boy Advance and
Compaq iPAQs. The 32-bit microprocessor was
designed using RISC architecture with data proc-
essing operations occurring in registers instead of
memory. The processor has 16 visible 32 bit regis-
ters and a reduced instruction set that is 32-bits
wide. The details on the registers and instructions
can be obtained from the ARM Architectural Ref-
erence Manual [2].
2. Related Works:
This section discusses different types of
simulators available today and their different ap-
proaches in design and implementation. Most
simulation tools can be classified as user level
simulators: these simulate the execution of a proc-
ess and emulate any system calls made on the tar-
get computer using the operating system of the
host computer [5]. WinARM is an example of this
type of simulator; it executes ARM instructions on
a host Pentium x86 processor using a
fetch-decode-execute paradigm. KScalar Simulator
[Moure 6], PPS suite [7], CPU Sim3.1 [8] and OA-
Mulator [9] are simulators best suited for educa-
tional purposes. They show the basic ideas of com-
puter organization with relatively few details and
complexity. They are specifically designed for stu-
dents who have little or no background in com-
puter architecture and who need a.
William PennWhat religion was William PennWilliam Pen was fr.docxalanfhall8953
William Penn
What religion was William Penn?
William Pen was from an Anglican family that was very distinguished. His father was Sir William Pen who was a landowner. At twenty two, Penn decided to join the Quakers which was also referred to as the Religious Society of Friends. The Quakers used to obey the inner light and they believed that the inner light came directly from God. They refused to take their hats off or even bow for any man. They also refused to take their arms up. Their beliefs were completely different as compared to the beliefs that the other Christians had (Barbour & Frost, 1988).
The Oxford University in England expelled Penn in the year 1662 since he refused to conform to the teachings of the Anglican Church. He could publicly state his beliefs and he could also print some of the things that he believed in.
Quakers’ founder was George Foxx who was a close friend to Penn. Cromwell’s death was a time of turmoil to the Quakers since they were suspected for the death. They were suspected because they had beliefs that differed from the religion that had been imposed for the state. They had also refused to swear a loyalty oath to Cromwell, who was the king. Quakers did not swear since Christ had commanded people not to swear.
The religious views that Penn had were a distress to his father. Naval service had helped him earn an Ireland estate and he had always hoped that the intelligence and charisma that his son had could help him in winning favor at the Charles II court. However, that could not happen since his son was always arrested. Penn and George Foxx were frequent companions since they could always travel together in order to spread their ministry. He also wrote a comprehension that was detailed and comprehensive regarding Quakerism. After the death of his father in 1670, Penn inherited the estates of the family and he could frequently visit the court of King Charles II where he was always campaigning for freedom in religion (Penn, 1794).
Where was William Penn born?
William Penn was born in London, United Kingdom. He was born on fourteenth of October in the year 1644. He was a privileged son since he was born by a gentleman who was a land owner. Thomas Loe, who was a Quaker minister, greatly affected Penn by his teachings.
In 1677 a group of important men all from Penn’s religion received a land area in the Colonies for them to settle. Penn himself remained in England but wrote a government for this new community. In what part of the US was this land area located?
In the year 1677, the Quakers relocated to another land. The city of Burlington is located in the Burlington County in New Jersey. It is Philadelphia’s suburb. The Quakers settlers moved to Burlington. Burlington served as West Jersey’s capital until the year 1702. The Quakers were able to formally establish their congregation in the year 1678. Initially, they could meet in private homes. However, between 1683 and 1687, a hexagonal house that was made .
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. Week Seven: Managing Knowledge
Information Resource Management
IT620
February 22, 2014
Running head: MANAGING KNOWLEDGE 1
MANAGING KNOWLEDGE 3
MANAGING KNOWLEDGE 2
Managing Knowledge
Chapter 14: Question 3. How do human capital, structural
capital, and customer capital differ?
ANSWER.
Human capital, structural capital and customer capital are three
basic fundamentals of any organization. They differ in their
roles playing for that organization. Human capital is the
efficiency of a human being on the basis of its skills; more the
human is skilled and efficient results in more human capital. On
the structural capital is the efficiency of the organizations to
provide environment in which they can increase the efficiencies
of humans working for them such as data, systems, knowledge
and designs. The customer capital is the relationship bond with
organization products, stronger the bond between the customer
and the products results in a stronger customer capital.
Chapter 14: Question 8. What approach did the energy company
take to encourage knowledge sharing among its 15 business
2. units?
ANSWER.
The approach that the energy company took to encourage
sharing among its 15 business units was establishing peer
groups from various units. The idea was to have employees
share his or her knowledge without the involvement of
leadership to avoid political aspects. Since this was
unsuccessful it was decided to provide a human portal for
employees where they can ask questions regarding the problems
they faced with their customers and employees from other
business units provides a solution to them, its kind knowledge
sharing between the organizations from different business units.
They also gave a chance to their employees to meet with the
other employees from different business unit so that they share
their experience for the growth of their particular business unit.
Chapter 14: Question 10. What three questions does Stewart
recommend be asked before launching a knowledge management
project?
ANSWER
The three questions that Stewart recommends to be asked before
launching a knowledge management project are listed as
follows:
Listing out the group that will use this knowledge space and
make them responsible for all the content they are going to post
on that knowledge space.
The type of knowledge groups was going to share on the
knowledge space and who will manage the context that the
employees were discussed on the knowledge space.
He also raises the question of the culture that the organization
is going to adopt, will that be composed of reusers or
originators because he stated both are different because a
repository of things promotes a reuse culture; an online chat
room helps originators, but this is not going to happen opposite.
3. Week 7 - Managing Knowledge
Due Date: Sat, Feb 22, 2014 11:55 PM MST
Write answers to the following textbook questions located at the
end of each chapter. Each answer should be approximately 70
words, or a total of approximately 900 words for all of your
answers combined.
· Chapter 14: Questions 3, 8, 10, 11, and 13 in the Review
Questions section
· Chapter 14: Questions 1 and 4 in the Exercises section
· Chapter 15: Questions 5, 6, 9, 12, and 14 in the Review
Questions section
· Chapter 15: Question 1 in the Exercises section
CHAPTER 14Introduction
In this chapter, we deal with two of the most important and
most talked about, yet still evolving, topics that relate to
supporting knowledge work. One is the subject of managing
knowledge. That means not only encouraging people to share
knowledge personally, but also putting their knowledge in a
form that others can easily access. Because knowledge can come
from inside as well as outside the firm, the final sections on
knowledge management deal with customer knowledge and
researchers’ knowledge and how to embed this outside
knowledge in a real-time system. Under this topic are the
intellectual capital issues of valuing intellectual property,
usage, and sharing knowledge.
The second topic is the vast arena of computer ethics, which
deals with such areas as information privacy, intellectual
property rights, and other legal and ethical issues relating to
information and knowledge. Many laws and regulations written
before the computer age and the Internet explosion are being
applied to today’s software, databases that house personally
identifiable information, and networks that connect different
cultures. The entire realm of intellectual capital challenges the
4. applicability of these laws and norms.
Consistent with the framework laid out in this text, we address
the problem of supporting knowledge work along three
dimensions: technology, organization, and environment.
Companies Want to Manage Knowledge
One of the enduring subjects in the IT field since the mid-1990s
has been knowledge management. Top corporate executives
realize that their greatest corporate assets walk out the door
every evening, taking with them another crucial asset,
knowledge. Attempts to capture knowledge in computer systems
continue. But for some experts and researchers in the field,
knowledge is not something that can be captured in a machine;
it only exists inside a person’s head. Information can be
captured in computers; knowledge cannot. Many feel that the
term “knowledge management” creates the wrong impression.
The term “management” often brings forth the “we can control
it” mind-set. Knowledge cannot be controlled or engineered, so
the mechanical metaphor is wrong. It can only be leveraged
through processes and culture. The biological or ecological
metaphor is much better. The more people are connected, and
the more they exchange ideas, the more their knowledge spreads
and can thus be leveraged. This view, of course, is still being
debated, and raises the question, “If we cannot disembody
knowledge, how do we better manage the knowledge within
people to leverage this asset?”
Tony Brewer,1a a researcher at Gartner, researched this topic
and notes that as we move from a service economy to a
knowledge economy, companies move toward managing their
intellectual capital in a more formal and deliberate way. In
essence, knowledge exists in two states, tacit and explicit. Tacit
knowledge exists within a person’s mind and is private and
unique to each person. Explicit knowledge has been articulated,
codified, and made public. Western management practices have
concentrated on managing explicit knowledge; but cultivating
and leveraging tacit knowledge is just as important. Effective
5. knowledge management requires transferring knowledge
between these two states.
How is that done? Well, says Brewer, because knowledge is not
a physical asset, it is not effectively described in terms of
manufacturing analogies, such as storing it in inventory. Rather,
it needs to be thought of in ecological terms, such as nurturing
it, cultivating it, and harvesting it. Furthermore, ways to
transfer knowledge back and forth between its tacit and explicit
states are crucial and are generally a result of encouraging the
free flow of ideas and information, something that
organizational norms, departmental boundaries, and national
differences can inhibit.
The process of transferring tacit knowledge to others is a key
part of managing knowledge. To emphasize this idea, some
companies have stopped talking about knowledge management
and use only the term “knowledge sharing.” In this regard, IT is
seen as one enabler, but not the main one. The key to knowledge
sharing seems to be getting people together face-to-face to
explain how they do things. Once people sit down and talk
about what they do and why, barriers fall, knowledge flows, and
sharing increases. Unfortunately, people are not given the time
or the space these days for this kind of interaction; free time for
sharing is not seen as important.A Model for Managing
Knowledge
Due to the increasing emphasis on knowledge, some now call it
intellectual capital to distinguish it from the other kinds of
capital that firms possess. Giga Information Group,2 a research
firm, has published a model for managing intellectual capital.
As shown in Figure 14-1, the model is circular and has four
stages, which represent what people generally do with
knowledge. First, they create it or capture it from a source.
Next, they organize it and put it into categories for easy
retrieval. Then they distribute it (push) or access it (pull).
Finally, they absorb another’s knowledge for their own use or to
create more new knowledge. Thus, the cycle begins again.
Figure 14-1 A Knowledge Management Framework
6. Source: Reprinted with permission from Best Practices in
Knowledge Management, Giga Information Group,
1997, www.gigaweb.com.
The four stages create three types of capital: human, structural,
and customer.
· Human capital.This form of intellectual capital consists of
knowledge, skills, and innovativeness of employees as well as
company values, culture, and philosophy. It is created during
the knowledge-creation-capture and knowledge-absorption-reuse
stages because these two stages focus on getting people together
to share knowledge. They deal with the people aspects of
knowledge management. Their main question is, “How do we
get people to have more knowledge in their heads?”
· Structural capital.This is the capabilities embedded in
hardware, software, databases, organizational structure, patents,
and trademarks that support employees as well as relationships
with customers. Structural capital is formed in the knowledge-
organization-categorization and knowledge-distribution-access
stages because these stages focus on moving knowledge from
people’s heads to a tangible company asset. These stages deal
with the technology issues surrounding knowledge management
and sharing. Their main question is, “How do we get knowledge
out of people’s heads and into a computer, a process, a
document, or another organizational asset?”
· Customer capital.This form of intellectual capital is the
strength of a company’s franchise with its customers and is
concerned with its relationships and networks of associates.
Furthermore, when customers are familiar with a company’s
products or services, the company can call that
familiarity customer capital. This form of capital may be either
human (relationships with the company) or structural (products
used from the company).
Based on a series of case studies, Giga discovered that the
human capital stages and the structural capital stages require
different mind-sets. Hence, companies have had to use different
7. approaches to grow each one; and the techniques for one do not
work for the other. The companies that focused on human
capital used touchy-feely, people-centric approaches. In some
cases, no technology was used at all. The companies that
focused on structural capital took a typical IS approach: using
technology to solve a problem. Little talk addressed individuals,
communities, and work practices; talk mainly centered on
yellow pages of experts, knowledge bases, and such. However,
to succeed in leveraging intellectual capital, companies need to
do both.
Now we turn to specifics of what companies have done to build
human capital, structural capital, and customer capital.
Building Human Capital
The emphasis in building human capital, notes Giga, is to
answer the question, “How do we get people to have more
knowledge in their heads?” Giga sees four ways: create it,
capture it, absorb it, and reuse it.Knowledge Creation and
Capture
This phase deals with generating knowledge, either by nurturing
employees to create it or by acquiring it from outside. Hence, it
deals with both human capital and customer capital. As noted
earlier, the Giga cases that emphasized this phase of managing
knowledge have used high-touch approaches, such as creating a
sharing culture, urging people to meet either in person or
electronically, and encouraging innovation.
As another example of what a company can do to promote
knowledge sharing globally, consider the approach that
Buckman Laboratories has taken. This description is based on
Brewer’s1a work.
Case Example: Buckman Laboratories
www.buckman.com
Buckman Laboratories, an industrial chemical company based in
Memphis, Tennessee, has some 1,300 employees across 70
countries around the world. The concept of sharing knowledge
and best practices has been around in Buckman for more than 15
8. years. In fact, the company’s code of ethics reinforces the
sharing culture. The company believes that successfully
transferring knowledge depends 90 percent on having the right
culture and 10 percent on technology.
To bring the knowledge of all Buckman’s employees to bear on
a customer problem anywhere in the world—whether in Europe,
South Africa, Australia/New Zealand, or Japan—Buckman
established a knowledge transfer system called K’Netix, the
Buckman Knowledge Network. The goal of K’Netix was to get
people who had not met each other, but belonged to the same
business, to communicate with each other and develop trust in
each other: trust that one person was interested in the other’s
success, trust that what one person received from others was
valid and sincere, and enough trust in the culture to help
someone else.
Ten years ago, sharing was accomplished mainly by people
traveling all over the world to see each other, with lots of face-
to-face conversations and meetings. Today, such meetings still
occur, but the technology helps people stay in touch between
these meetings, making communications more continuous.
When employees need information or help, they ask via forums,
which are Buckman-only online forums over the Internet. In all,
seven forums in Tech-Forum are organized by industry and are
open to all employees.
One particularly influential conversation, which set the tone for
company-wide sharing, took place over TechForum and
concerned Buckman’s global sales awards. A large cash award
was split among the top three salespeople worldwide; the top 20
got plaques. It was based on a formula that took many factors
into account. The salespeople, however, were unhappy with the
formula. When this discussion appeared on the companywide
forum, then-CEO Bob Buckman jumped into the fray and
decided that the entire company should iron out the problems in
front of all employees. Hundreds of messages were recorded,
and the entire award structure was restructured online in front
of everyone. It was a rare opportunity to allow everyone to
9. share in an important, yet sensitive, company subject.
Moreover, top management did not dictate the results. This
conversation reinforced the sharing culture.
The conversations are the basis for transferring knowledge
around the company. So the important ones are captured.
Volunteer experts identify conversations that contain valuable
information and, more importantly, valuable streams of
reasoning. This information is then edited to remove extraneous
material, given keywords, and stored in the forum library. In
essence, Buckman is capturing the artifacts of its virtual teams
in action. In so doing, it is creating a self-building knowledge
base, which can be used for what-if analyses and can be mined
to create new knowledge.
The prime benefit is timely, high-quality responses to customer
needs. For example, a new employee in Brazil was scheduled to
visit a customer who had a particular problem. The salesperson
posted both the problem and a suggested solution in a forum and
sought advice from anyone with more experience. A response
came quickly: “I’ve faced this problem and your pH is too high;
it will cause odors and ruin the paper. Bring the pH down by
two points. That won’t hurt the process, and it will clear up the
problem.” As a result, this new employee, who had only modest
experience, was able to present a proposal with the experience
of a 25-year veteran, and make the sale.Knowledge Absorption
and Reuse
This phase of building human capital addresses the notion of
getting knowledge into people’s heads where it can be enhanced
and reused. Irrespective of whether people believe that
knowledge only exists in minds or can exist in computers, the
Giga cases that emphasized this phase of managing knowledge
used high-touch approaches. They too focused on nurturing
interactions among people, recognizing the knowledge
brokers who exist in companies, and supporting communities of
practice.Recognizing knowledge brokers: “The Rudy problem.”
Simply discovering who has what knowledge is a step in the
right direction to fostering knowledge sharing. Yet, when
10. possessing knowledge is not rewarded by management, neither
is sharing, as the following story illustrates.
At a knowledge management conference, Dr. Patricia
Seemann,3 who headed up a knowledge management project at a
pharmaceutical company, told the story of Serge and Rudy
(fictitious names but real people). Serge, she said, was a “real”
manager. He had a three-window office, a big desk, and a title.
If you asked him what he did the past year, he would say, “I
registered 600 products in 30 countries.” Rudy, on the other
hand, is a headache, his manager says, because he does not
work. He just stands around and talks all day. Whenever you see
him, he is talking to someone. When you ask him what he did
the past year, he says, “I sort of helped out.”
The company downsized, and guess who got laid off? Rudy.
And then what happened? His department fell apart because
there was no one to help, to provide guidance. When they fired
Rudy, they fired their organizational memory, said Seemann. He
was a crucial, yet unrecognized asset, because he was willing to
share his knowledge.
While at this company, Seemann and her team created a yellow
pages guide of company knowledge brokers. Guess who was in
the book and who was not? Rudy, of course, was in the book.
Serge was not, and neither was top management. How can
companies fix what she calls “the Rudy problem”? One way is
to create a technical career track and promote knowledge
brokers. Giving Rudy a title would have made an enormous
difference, Seemann said, because it would have sent a signal
that knowledge sharing was recognized in the company.
Companies cannot appoint knowledge brokers. They just
emerge. And when they do emerge, they need support.One
approach to fostering knowledge sharing: T-shaped managers
If not understanding Rudy’s role in the organization is how not
to foster knowledge sharing, what is a way to nurture it? Morton
Hansen, of Harvard Business School and Bolko von Oetinger, of
Boston Consulting Group4 propose what they call T-shaped
managers. These are executives who have both a vertical role
11. (such as running a business unit) and a horizontal role (such as
sharing knowledge with their peers in other business units).
The goal of this structure is to circumvent the limitations of
knowledge management systems: They can only house explicit
knowledge (not implicit know-how); they cannot foster
collaboration by just making documents available, and their
directories of experts can get out of date quickly. T-shaped
management is especially important in organizations with
autonomous business units because it helps counterbalance their
tendency to compete with each other and hoard expertise.
Whereas the value of T-managers’ vertical work is measured by
traditional bottom-line financial performance, the value of their
horizontal work is measured in five ways, note Hansen and von
Oetinger:
1. Increased company efficiency from transferring best practices
among business units
2. Better decisions by soliciting peer advice
3. Increased revenue by sharing expertise, again, among peers
who are experts in areas in question
4. Development of new business ventures by cross-pollinating
ideas
5. Moving strategically through well-coordinated efforts among
peers
However, success in these five areas does not just happen.
Knowledge sharing requires clear incentives. The company
needs reward sharing. Furthermore, sharing needs to go both
ways—give and take. Benchmarking across business units can
encourage underperformers to ask for help. Success also
requires formalizing cross-unit interactions. It does not mean
creating bureaucracy, but rather creating peer-level collegial
support (and confrontation). It also means picking and choosing
which cross-unit requests to fulfill based on expected business
results and how much someone can really contribute.
BP is exemplary in its use of the T-manager concept, state
Hansen and von Oetinger. The insight Hansen and von Oetinger
learned from studying BP is that mechanisms must be put in
12. place to both foster and guide managers’ knowledge-sharing
activities; otherwise, they start to take up too much time and
produce few results.
Case Example: BP
www.bp.com
BP is in the energy business. It merged with Amoco in 1998,
with ARCO in 2000, and Castrol and Veba Aral in Germany in
2002; it now has 100,000 employees in 110 countries. BP’s
approach to T-shaped management began in the early 1990s in
BPX, its oil and gas exploration division. To cut layers and
increase accountability, John Browne, then head of BPX and
now head of BP, divided the division into 50 autonomous
business units. Unfortunately, each business unit head focused
only on his or her unit, not on BPX.
To get the business unit heads working together, Browne
instituted peer groups in 1993, each with about 12 business unit
leaders in similar businesses. No bosses were allowed in these
peer groups, so the discussions would be candid and not consist
of political posturing. Sharing did increase, but it was not until
1994, when these groups were made responsible for allocating
capital within their group and for setting their performance
levels, that their sharing started to truly impact BPX’s
performance. The peer group members finally saw the financial
value of sharing expertise. When Browne became CEO in 1995,
he instituted peer groups BP-wide.
BP has also created cross-unit networks around areas of shared
interest. However, BP found, unfortunately, that these several
hundred networks cost a lot of time and money (with people
flying all over the globe) without resulting in better results.
Thus, the number and use have been limited.
BP has also instituted the practice of identifying a limited
number of “human portals” who connect people, so that
everyone is not trying to network with everyone else. Typically
these people are not the top executives, note Hansen and von
Oetinger, and typically they have been at BP a long time and in
many jobs and locations.
13. IT plays a role in these various knowledge-sharing activities.
An electronic yellow pages identifies experts, and multimedia e-
mail and desktop video conferencing permit easier virtual team
meetings, report Hansen and von Oetinger.
Since the mergers, BP has reorganized its business units into
new peer groups that are more strategically focused. As Hansen
and von Oetinger note, the evolution continues.
One T-Shaped Manager’s Experiences
One BP T-shaped executive, who heads BP’s gas business unit
in Egypt, illustrates this new mode of operation. Formerly,
whenever his business unit needed help, he would call
headquarters. Now, he looks to his peers in other gas units.
His job essentially has two roles, one vertical and one
horizontal. He is CEO of the business unit, so he is responsible
for its profit-and-loss statement, capital investment decisions,
and such. He is also expected to participate in cross-unit
activities, which take up some 20 percent of his time. These
activities can undermine his vertical role, so he and the seven
gas-production peers in the Mediterranean and Atlantic regions
in his peer group limit their meetings to business purposes.
Knowledge sharing is not enough of a reason to meet. Instead,
they meet to decide how to allocate capital among themselves
and how to meet production targets set by their division’s
executive committee.
In his knowledge-sharing role, in addition to collaborating, he
also connects people, acting in some ways like a “human
portal,” suggesting who might help solve a problem, for
example. He also gives advice to peer business units when
asked and when he feels he can contribute. He was personally
involved in 3 out of 20 of his business unit’s “peer assists” one
year, report Hansen and von Oetinger. In addition, he also
requests peer assists, receiving 10 assists one year from BP
business units around the world.
Due to all BP’s networking, people know where expertise lies,
so they go directly to the expertise rather than through
headquarters. And because sharing is rewarded, bosses know
14. who is sharing (and requesting assistance) and who is not. In its
knowledge-sharing efforts, BP has aimed to change management
activities, not corporate structure, to gain the benefits of
knowledge sharing while preserving the autonomy of its
business units so that they can more quickly and effectively
serve their local markets. As John Browne stepped down in
2007 as the Group Chief Executive, he claimed that the success
of his tenure was the improvement of BP’s ability to learn from
mistakes and to create a knowledge-driven and sustainable
institution.
Building Structural Capital
The Rudy story also fits with this second subject, building
structural capital, because that is what Seemann and her team
aimed to do in creating the online yellow pages of knowledge
brokers. Her goal was to increase their value. Those yellow
pages are a form of structural capital. As noted earlier,
companies that emphasize building structural capital generally
use high-tech approaches.Knowledge Organization and
Categorization
This phase is often handled by creating best practices
knowledge bases or metadata indexes for documents. A few
have even tried to measure intellectual capital. Following are
two examples, one that focused on improving a knowledge-
support process and one that looked into valuing intellectual
capital.
Case Example: A Pharmaceutical Company
A project at a major pharmaceutical company was aimed at
improving the process of developing new drugs and getting
them approved by the U.S. Food and Drug Administration
(FDA), a process that takes 5 to 10 years, costs $250 million,
and can yield revenues of $1 million a day per drug once it
reaches the market.
This project, described at the Knowledge Imperative
Conference,3 revolved around creating a “knowledge
infrastructure,” one that manages information, enables
15. understanding, and supports learning. The crux of the matter
was to understand the customer’s needs. In this case, the FDA is
the primary customer; however, insurance companies, doctors,
and consumers are also customers. The company sells all of
them knowledge about disease, treatment, and how a drug will
work in particular scenarios. When employees understand the
type of knowledge they need to create for these customers and
their role in its creation, they will identify better ways to work.
The project began by studying and codifying 60,000 pages of
documents filed with the FDA to discern how the teams
developing drugs and filing their results were sharing
knowledge. These regulatory files explain to the FDA what the
company knows about a drug, how it learned those things, and
what conclusions it has reached.
The knowledge-infrastructure project team found the files
lacking. Each file should have four parts: purpose, content,
logic, and context. Only one of the files had a statement of
purpose, which stated the problem to be solved. A file without a
statement of purpose shows that the author does not know the
reason for the document. Many files had contradictions, which
told the team that the authors had not talked to each other. For
instance, they disagreed on whether the drug should be taken
once or twice a day.
To rectify the situation, the study team created a generic
knowledge tree of the questions the FDA asks when deciding
whether to approve a drug. The top of the tree has their three
main questions: Is it safe? Does it work? Does it have sufficient
quality? The tree lays out the supporting questions for these
three main questions, in layers, which shows the teams which
questions they need to answer to the FDA’s satisfaction. It also
shows people why others need specific information, thus giving
them a context (beyond trust) for sharing.
In a pilot project, the knowledge-infrastructure team used a
different process with one team: writing as a tool for thinking.
They got the team to write up their 10-year drug study before
they did it, so that the team members were clear about the data
16. they needed to gather and present to the FDA. Furthermore, they
wrote the report template publicly as a team. To create the
template, they wrote critical points that had to be in the report
on Post-It notes. Next, they prioritized the points on huge sheets
of paper on the meeting-room wall. Then they designed studies
to prove the points that had to be proven. In creating this virtual
prototype of the knowledge to be presented to the FDA,
publicly, on the wall, they could physically see what knowledge
was needed. They created a common mental model of the
results. It was a powerful technique.
They have seen tangible progress in filling in the report sections
on content, logic, context, and purpose. In another case, where
an existing drug was to be registered for use with a new disease,
the team had not made much progress in two years’ time. After
they were shown the knowledge tree over a two-day period, they
were able to submit the file to the FDA in three months (they
had previously estimated 18 months), and the FDA approved it
in 18 months (the team had estimated three years).
Skandia Future Centers,1b discussed in Chapter 4, provides an
example of delving into the world of valuing knowledge. Few
firms have ventured into this realm, but because Skandia deals
in knowledge and wants to experiment with the future, this is
one area it has explored.
Case Example: Skandia Future Centers
www.skandia.com
The charter for Skandia Future Centers is organizational
prototyping. One project, the knowledge exchange, has
addressed the question of putting a value on intangibles, such as
knowledge.
Today, some 70 percent of investments in the United States are
for intangibles; in Sweden it is 90 percent. However, no
common mechanism for establishing their value or trading that
value is yet available. A knowledge exchange increases the
accessibility of hidden knowledge and will act as a multiplier
for wealth creators, both people and organizations.
Skandia’s knowledge exchange began as a network for
17. exchanging knowledge using software akin to Lotus Notes. Over
time, it has evolved into a Web-based trading arena where
people can buy and sell knowledge assets. It is now based on
Nonet, a Lotus Notes–like product from Metaphor, a Spanish
company.
It has two test sites called ICuniverse.com (IC stands for
intellectual capital) andFuturizing.com. On ICuniverse.com, for
example, before responding to an e-mail message, the recipient
and the sender first agree on a price to be paid to the responder,
perhaps via an auction. Thus, people are paid for the knowledge
they provide. Ideas and writings can be housed
on ICuniverse.com and resold, which gives high yield to
currently unvalued intellectual assets.
The two sites run on an infrastructure (IQport) owned by
NatWest in the United Kingdom and were built over several
years’ time. IQport includes software and a financial clearing
mechanism so that information that is generally thrown away
can be wrapped into a package and given a price tag. The sites
are linked to two accounts at NatWest; one is in financial
currency (traditional money), the other is in digital currency,
which can be used to purchase other knowledge. Skandia is
testing this concept because it could become a new global
currency. It is part of the new digital economy.
The knowledge-exchange project has been self-organizing from
the start. The center simply provides the arena for “knowledge
entrepreneurs” or “knowledge nomads”—people who go from
arena to arena working on their latest ideas. Thus, the center
supports a nontraditional working model.
To illustrate its migration, the project began with IT people
from the United Kingdom who were then joined by IT people
from Sweden and the United States. Later, students and the
professor from Venezuela who developed Nonet for oil
companies was the mainstay. The students collaborated with the
professor at the center and with Metaphor, the Spanish company
that bought Nonet. Today, the knowledge-exchange team has
people from Sweden and Denmark.
18. The question that Skandia Future Centers is now asking itself
is: How can we reward knowledge nomads? They do not want a
career; they want a journey and freedom. Their lifestyle does
not fit into traditional organizational models, yet working with
them helps speed up accounting and organizational remodeling
because they act like bees, moving among research centers
pollinating companies with ideas.Knowledge Distribution and
Access
This phase emphasizes both pushing knowledge out to users
(distribution) and accommodating users who pull information to
themselves (access). The Giga cases that emphasized this phase
also used high-tech approaches. They focused on implementing
networks and networking tools to access human and structural
capital. Intranets and groupware were important IT-based tools.
To illustrate one enterprise’s approach, we turn to a U.S. energy
company discussed in the Giga report.2
Case Example: A U.S. Energy Company
In this highly autonomous energy company, the 15 business
units each focused on their own performance. To instill sharing
in this culture, these units would have to see the benefits
themselves. In addition, many of the employees were concerned
they would not get credit for their good ideas. To overcome
both issues, management decided to focus on promulgating best
practices across the business units. A best practice was defined
as a practice, know-how, or experience that had proven
effective or valuable in one organization and might be
applicable to another, notes Giga.
With management encouragement, a number of programs to
collect best practices arose. For example, groups in the refining
division documented best practices using Lotus Notes.13 They
documented “hard” practices (such as distilling techniques) and
“soft” practices (such as training) and recorded metrics, where
possible. The division estimated it saved $130 million a year
utilizing each other’s best practices, notes Giga. Similar
programs appeared in other divisions.
Yet, these efforts were disparate, so an enterprising manager
19. within IS gathered all the statistics together and presented them
to top management to demonstrate how the company could be
nurtured to become a learning company. With top management
support, an important booklet was created to align the various
divisions. It explained the company’s mission, vision,
values, total quality management (TQM), and environmental
policies. It became the guide for sharing best practices.
In fact, the TQM principles of focusing on processes, measuring
processes, and continuously improving them, which the
company’s employees understood and used, played an important
role in espousing knowledge distribution and reuse.
One example was in its capital projects management process.
This process is used to manage some $4 billion worth of
projects a year. In benchmarking this process, management
discovered it had some gaps. Therefore, the process was
redesigned, and management of capital projects improved.
Seeing the benefits of this process orientation, the corporate
office funded other cross-business-unit initiatives that fostered
sharing.
However, there was still no central responsibility for knowledge
distribution and reuse, and such centralization would not fit the
culture well. To solve this problem, certain people were
designated “technical knowledge experts” because they knew
about best practices across the company. Their job was to
disseminate tacit knowledge. To do that, they looked for
technical ways to turn tacit knowledge into explicit knowledge.
Lotus Notes, as noted earlier, was commonly used to house best
practices. It links best practice databases across the 15
operating companies. Employees are encouraged to use Notes to
describe best practices, search for a mentor on a subject they
need to know about, and find best practices. Notes has also been
used to support processes. For example, it is used to coordinate
the around-the-clock work of 100 employees in the refining
company. In creating this workflow system, the employees
reengineered the work so coordination worked more smoothly.
The company has also created online discussion databases, some
20. 50 of them, to encourage sharing and reduce travel. Some of the
networks have attracted hundreds of employees, leading to a
more networked culture. In turn, some of these networks have
led to face-to-face get-togethers, which have further spurred
sharing on common topics, such as how to reduce energy costs,
improve quality, and hone public relations in different cultures.
In short, this company has spurred best practice sharing
wherever it makes sense, mainly guided by the interests of the
employees. The results have not only been cost savings, but also
a change in employee perception, based on the results of
employee satisfaction surveys. Employees responded that there
was increased emphasis on processes and more sharing of best
practices across the company.
Building Customer Capital
As noted earlier, customer capital is the strength of a company’s
franchise with its customers, the percentage of customer
“mindshare” in its industry. Brand recognition is part of
customer capital. Familiarity with one’s products is another.
One of the most fascinating case studies in the Giga knowledge
management report,2 all of which are anonymous, is the one
about the vice president who derived the notion of customer
capital. Here is that story, based on that report.
Case Example: A North American Bank
After the U.S. savings and loan debacle and the devaluation of
real estate in the 1980s, the vice president of organizational
learning and leadership development at a North American bank
asked, “Why have banks become so exposed to risk in their
lending practices?” The answer he arrived at was, “Because they
do not understand the new information age and its underpinning
collateral.” At the time, and still today, banks lent money
against hard assets, such as a shopping mall. However, the value
of such assets can dissipate almost overnight, making them
risky collateral. “Perhaps there is less risk in lending against
soft assets, such as a group’s knowledge of a programming
language or a patented process,” he reasoned. Knowledge in a
21. person’s head does not disappear overnight. However, the vice
president had no way of valuing such intangibles. He continued
to work on the problem of knowledge valuation. Over time, his
thinking changed the way the bank evaluated new hires and
reshaped some of its operations.
To begin his quest on how to value knowledge, or intellectual
capital, he drew on the ideas of human capital and structural
capital, and then added his own: customer capital.
Human capital was the know-how to meet customer needs; he
asked bank managers to measure it by assessing how fast their
teams learned. To increase human capital, he shifted emphasis
at the bank from training (pushing instruction to people) to
learning (getting people to pull the instruction they needed to
them), because he believed the crux of increasing human capital
was increasing the pace at which an organization learns. He
believed people learned when they “owned” their learning and
took responsibility for applying it to improve their performance.
He developed a list of skills needed to serve customers and gave
employees numerous ways to learn these skills, from reading
specific books to choosing a mentor.
Structural capital was the organizational capabilities needed by
the marketplace. The vice president measured structural capital
by uncovering the percentage of bank revenue that came from
new services and similar metrics. He believed that although it
takes human capital to build structural capital, the better the
bank’s structural capital, the higher its human capital; one feeds
the other. Thus, he generated structural capital from human
capital by creating a competitive intelligence “library” about
the industry that the bank considers a valuable “intellectual
capital repository.” Rather than being a library of documents,
however, it was a map that showed the kinds of knowledge the
bank held and where it existed, whether in an employee’s head
or a database.
Customer capital was the intellectual assets in the minds of
customers related to the bank. The vice president’s team
measured three aspects: depth of knowledge about the bank in a
22. customer organization, breadth of knowledge by a customer, and
loyalty to the bank. To strengthen these aspects, the vice
president believed the bank needed to assist its customers’
employees in learning. Some of that learning pertained to
learning more about the bank, which required making the bank’s
values and strategies congruent with those of its customers. The
vice president therefore helped senior bank officials determine
customer needs; establish a common language for
communicating with customers; develop a sense of purpose for
the relationship; and, most importantly, make learning within
the customer organization an important part of the bank’s
services. He believes that assisting customers will increase his
bank’s customer capital: depth, breadth, and loyalty. Thus, his
knowledge management efforts focused outwardly as well as
inwardly.
To recap, Figure 14-2 shows the key activities in each of the
four stages, the form of capital each supports, the skills
required of people, and the tools and techniques that are proving
valuable for that stage.
Figure 14-2 Knowledge Management Stages
Phase
Emphasis
Skills/People
Tools/Techniques
Creation and Capture
Generate new knowledge
Make tacit knowledge explicit
Hire people with the right knowledge
Create culture of sharing
Encourage innovation
Incentives for sharing
Human capital
Customer capital
Knowledge harvesters
Knowledge owners
Mentoring/coaching
23. Partner with universities
Teamwork
Business intelligence
Top management
Easy-to-use capture tools
E-mail
Face-to-face meetings
Knowledge tree
Write-to-think
Feedback
Organization and Categorization
Package knowledge
Add context to information
Create categories of knowledge
Create knowledge vocabulary
Create metadata tags for documents
Measure intellectual capital
Structural capital
Academics
Knowledge editors
Librarians
Knowledge architects
Authors
Subject matter experts
IS
Frameworks
Cull knowledge from sources
Best practices databases
Knowledge bases
Knowledge thesaurus
Knowledge indexes
Measurement tools
Distribution and Access
Create links to knowledge
Create networks of people
Create electronic push and pull distribution mechanisms
24. Knowledge sharing
Structural capital
Publishers
Top management
IS
HTML
Groupware, Lotus Notes
Networks, intranets
Navigation aids
Search tools
Absorption and Reuse
Stimulate interaction among people
The learning organization
Informal networks
Human capital
Group facilitators
Organizational developers
Matchmakers
Knowledge brokers
Team processes
Electronic bulletin boards
Communities of practice
Yellow pages
Source: Reprinted with permission from Best Practices in
Knowledge Management, Giga Information Group,
1997, www.gigaweb.com.
The Cultural Side of Knowledge Management
Success in managing knowledge comes as much from changing
organizational behavior as it does from implementing new
technology, notes Cyril Brooks.5 His company, Grapevine,
offers a product for managing information and knowledge. He
notes that besides the platitude of “create a culture that rewards
sharing,” few people recommend specifics on how to reduce the
cultural roadblocks that can hinder knowledge management
projects. He describes some cultural barriers, which he calls
25. “red flags.”Watch Out for Cultural Red Flags
Cultural barriers can shut down knowledge management efforts
because knowledge management is really about cooperation and
sharing. To reach these lofty goals, efforts need to turn the tacit
knowledge in people’s heads into explicit knowledge in a
process, product, or other organizational artifact. Thus,
knowledge management work must tap people’s motivations to
share and cooperate. Without the motivation, knowledge
databases, for example, are not updated or errors are ignored.
Or people avoid contributing to a knowledge-sharing network
for fear they will give away their best ideas and lose their
“competitive advantage” against their peers in the company.
Such red flags are not obvious; they are often subtle, yet
harmful, says Brooks.
Here are a few of his behavioral red flags that can derail a
knowledge management effort:
· Being seen as a whistle-blower or messenger of bad news. Few
people want to betray their boss, so they avoid presenting early
warnings or disagreeing with internal documents. In
organizations where “messengers get shot,” sharing good news
is fine, but sharing bad news is not, which defeats the full value
of sharing.
· Losing one’s place as a knowledge gatekeeper. Although
knowledge brokers are important in organizations, their self-
value comes from their controlling the knowledge they house
and sharing it only with whom and when they choose. They may
see a knowledge management system that encourages the free
flow of ideas as decreasing their value, and therefore fight it.
· Knowledge sharing really does take time. Because sharing
takes time, experts may hide so that they are not bothered by
requests from others. Others may not participate in, say,
presenting their ideas, which may benefit the organization as a
whole but has no personal reward, so they think.
These reactions are human; therefore, knowledge management
efforts often need to build “cultural workarounds” so that these
kinds of reactions do not block the work. Brooks offers some
26. suggestions. For example, to reduce concerns about being a
messenger, the system might allow only limited dissemination
of some ideas or give people the ability to rank feedback
comments based on their significance. To counter concerns
about losing personal advantage, contributions could require
authorship or comments might always be linked to the original
items. To reduce time consumption, the reward structure could
reward contributions based on their value.
In addition to cultural red flags, management red flags are also
a concern. Three management red flags are:
1. Saying the project is not cost-justifiable because the benefits
are intangible
2. Concern that too much participation will reduce employee
productivity
3. Concern that creating the taxonomy of knowledge categories
will be just too expensive to undertake
Reducing these concerns is an important aspect of knowledge
management. Some examples for mitigating these management
roadblocks, says Brooks, include illustrating the value of
serendipity that has occurred due to sharing, as illustrated in
vendor case studies; ensuring that the new system promotes
feedback to contributors, which can increase productivity; and
drawing on vendor expertise to create knowledge taxonomies
rather than start from scratch.
As Brooks points out, organizational culture is an important
aspect of knowledge management efforts and a key determinant
of success.Design the System to Match What the Users Value
Thomas Stewart,6 a well-known writer in the knowledge
management field, agrees and makes the important point that
knowledge needs to be managed within the context where value
is created. In short, the system needs to be designed to fit the
people who will use it and gain value from it. He notes that
many official knowledge management efforts have come to
naught because they did not create the place where people first
look for knowledge. On the other hand, a number of grassroots,
unofficial efforts have succeeded.
27. Stewart gives the example of three consultants who created an
informal, unofficial Notes-based e-mail list in their company to
have a place to collaborate online. Anyone could join the list; to
date, it has attracted over 500 company employees. It has
actually become the premier knowledge-sharing mechanism in
the company even though it is difficult to search and generates a
lot of messages, which fill up e-mail boxes. It works for four
reasons:
1. It is demand driven. Some 80 percent of the traffic is
members asking each other, “Does anyone know anything about.
. . . ?”
2. It roots out tacit knowledge. People contribute what they
know, which might not be recorded anywhere in the company.
3. It is right in front of the members in their e-mail boxes every
day.
4. It is full of intriguing and strongly held opinions, which the
members find most interesting.
The system is like a conversation rather than a library; thus, it
is about learning rather than teaching. That is a major
difference. It was designed to manage knowledge in the context
where value is created. Given the high number of failed
knowledge management projects, Stewart suggests answering
the following three questions before launching off:
1. Which group will use this knowledge space? Once
determined, make them responsible for the content.
2. What kind of knowledge does the group need? Once known,
that knowledge needs to be managed within that group’s context
because that is where the value arises. A knowledge
management system or resource should only deal with a single
group that creates value in the same way.
3. What is the company culture; is it composed of reusers or
originators? The difference matters. A repository of things
promotes a reuse culture; an online chat room helps originators,
but not vice versa.
Beware of creating a system that supports the wrong culture.
There is really no such thing as a generic knowledge
28. management system. Each one needs to fit a knowledge-sharing
group. Answering these questions will help uncover the
structure and content of a knowledge management resource that
will add value and actually be used.
As an example of a knowledge management project that has
worked and has followed many of the tenets espoused by
Stewart, consider the work at Partners HealthCare System in
Boston. Notice how it takes into account the health care culture.
Case Example: Partners Healthcare System
www.partners.org
Not too long ago, Tom Davenport of Accenture’s Institute for
Strategic Change and John Glaser, CIO of Partners HealthCare
System in Boston,7 described how Partners HealthCare System
is delivering just-in-time knowledge.
The problem the physicians at Partners HealthCare hospitals and
physician groups face is the deluge of new knowledge they need
to know but cannot possibly keep up with on their own. The
solution has been to present physicians with the new knowledge
they need when they need it through the information technology
they already use in their work. In essence, this approach makes
knowledge management part of their job, not a separate activity,
and it can deliver knowledge just when a patient really needs it.
The work at Partners HealthCare began on a small, doable scale:
using the doctors’ online order entry system to notify doctors of
drug interactions when they enter a prescription order. The
system checks the patient’s medical record, looks for allergic
reactions to the drug (or a similar drug), and alerts the
physician. The doctor can inquire about the reaction, and, if it
was mild, override the computer’s recommendation to switch to
another medication.
The system can also tell the doctor about a newer, more
effective drug or inform him or her of another drug the patient
is taking that can lead to a bad interaction. Or, if the doctor is
ordering a test, the system can describe a newer, more effective
test for the noted symptom. Or the system can warn the doctor
that the prescribed medication could worsen a patient’s disease.
29. This integrated system is built on knowledge bases (databases
of knowledge about the patient, drugs, tests, medical research,
and such) and a logic engine (which, as its name implies,
performs the logical interconnections between the various kinds
of knowledge in the knowledge bases).
The system also has an event-detection mechanism, which alerts
a physician when it learns of an event that can endanger the
health of a patient. For example, when the patient’s health
indicators deviate from the norm while the patient is in the
hospital, the doctor or a nurse is notified via pager. This
capability brings knowledge management into real time, note
Davenport and Glaser.
However, this system could not be bought. It had to be built by
Partners HealthCare. It was a large investment, but it was made
because too many patients at Partners were experiencing drug
interactions. Management had to fix that problem. One of the
steps it took was to form committees of top clinicians to
identify the knowledge that needed to be in the knowledge bases
and keep it up to date. The drug therapy committee makes the
medication recommendations, whereas the radiology committee
develops the logic to guide radiology testing. Participation in
each committee is seen as prestigious, which is crucial to the
success of the system, so that busy physicians give time to the
committee work.
Another step Partners took was to only address the most critical
processes. Furthermore, the system is simply seen as a
recommendation system. It does not make final decisions. Those
are left up to the physicians. The combined human–computer
system seems to be working. Some 380 orders (out of 13,000 a
day) are changed due to a computer suggestion.
Some one-third to one-half of orders with drug interactions are
cancelled, and some 72 percent of treatments are changed when
the event-detection system sounds an alert. Partner’s strong
measurement culture helps it gather such statistics and see the
benefits of the system.
In summary, embedding knowledge in the systems and work
30. processes that professionals use is an effective way to achieve
just-in-time knowledge management and dramatically improve
an organization’s performance.Intellectual Capital Issues
Data, information, content, and intellectual capital all raise
some thorny issues. These issues have prompted legislation in
some countries, but not all, which causes even more problems in
today’s intertwined, global society. Their resolution is
important for global e-commerce, and such resolution could be a
long way off. We begin by looking at information value, usage,
and sharing issues. Then we move on to the large, but rarely
discussed, subject of computer ethics.
If information is to be viewed as an asset, as many companies
now do, it must be treated differently from the traditional assets
of labor and capital, notes Thomas Davenport.8 For one thing,
information is not divisible. Nor is it scarce. In addition,
ownership cannot be clearly defined. We discuss here four
categories of issues in managing information:
1. Value issues
2. Usage issues
3. Sharing issues
4. Social and ecological issues
Value Issues
Information’s value depends on the recipient and the context. In
fact, most people cannot put a value on a piece of information
until they have seen it. However, people do, indeed, place
values on information. Look at all the information services that
people buy. Information marketplaces exist, both inside and
outside of companies. The only practical way to establish the
value of information is to establish a price for it and see
whether anyone buys it. Pricing possibilities include charging
for the information itself rather than for the technology or the
provider, charging by the document rather than a smaller unit,
charging by length or time or number of users, or charging by
value rather than cost.
A number of tools are being used within companies to increase
31. the value of information.
· Information maps.These maps can be text-based charts or even
diagrammatic maps that point to the location of information,
whether in written material, experts’ minds, and so forth. IBM,
for example, created a guide to market information so that
managers can find out where to get quick answers to their ad
hoc questions. The result has been less money spent on
duplicate information and increased understanding of the kinds
of questions people typically ask.
· Information guides.Guides are people who know where desired
information can be found. Librarians have traditionally played
this role. Hallmark Cards, for instance, created a job guide in its
business units to help employees find computer-based
information on available jobs. These guides have substantially
reduced the time needed to find information.
· Business documents.Business documents are yet another tool
for sharing information. They provide organization and context.
One fruitful way to embark on information management is to
uncover what documents an organization needs. This process
can be easier, and more useful, than defining common terms.
One brokerage firm discovered that its brokers all used the same
documents, over and over. Some 90 percent of these documents
could be put on one CD-ROM, kept on local servers, and
updated monthly, greatly facilitating information use.
· Groupware.Groupware is a tool for getting greater value out of
less structured information. It allows people to share
information across distances in a more structured manner than
e-mail. Lotus Notes is such a product. Groupware can ease
discussions and aid distribution of information, but its success
depends upon the culture. For one, better access to information
increases (not decreases) people’s appetite for even more
information. However, employees using sophisticated
groupware products need to learn how the technology can be
used to improve work habits and profits, neither of which flows
naturally from the technology.
To create value, the databases need to be managed, even pruned
32. and restructured. Knowledgeable people are needed to manage
the information resource and its use. This need is true for
intranets and Web sites as well.
Usage Issues
Information management is a management issue because it deals
with how people use information, not how they use machines,
says Davenport. Three points illustrate the importance and
difficulty of managing information use.
One, information’s complexity needs to be preserved.
Information should not be simplified to be made to fit into a
computer, because doing so truncates sharing and conversations.
Information does not conform to common definitions. It is
messy. It naturally has different perspectives, which are
important and need to be preserved. A certain amount of tension
between the desire for one common global meaning and
numerous familiar local meanings is inevitable. Companies that
want to settle on common corporate terms must do so with line
people, not technical people, because line people will use the
end results. The IS organization can facilitate these discussions,
but the businesspeople should determine the meanings.
Two, people do not easily share information, even though its
value grows as it is shared. Culture often blocks sharing,
especially in highly competitive organizational cultures.
Three, technology does not change culture. Just building an
information system does not mean that people will use it. It is a
false assumption that too many IS people make. To change the
information culture of a company requires changing basic
behaviors, values, attitudes, and management expectations.
Sharing Issues
If information sharing is the goal, a number of contentious
challenges must first be resolved. Davenport explains that a
sharing culture must be in place or the existing disincentives
will thwart use of a sharing system.
Technical solutions do not address the sharing issue. For
33. example, much talk has touted information architectures, where
the definitions of stable types of corporate data, such as
customers, products, and business transactions, can be specified
ahead of time and used consistently across the firm. This
approach may work for data, but it is problematic for
information, because information architectures generally fail to
take into account how people use the information. Managers get
two-thirds of their information from conversations, one-third
from documents, and almost none directly from computer
systems. Therefore, a common computer-based information
architecture is not likely to solve the information-management
problem.
An issue in sharing is: Who determines who has legitimate need
for the information? The “owning” department? Top
management? And who identifies the owner? The process of
developing the principles for managing information—how it is
defined and distributed—is actually more important than the
resulting principles because the touchy subject of information
sharing is brought out into the open during the process. In short,
working out information issues requires addressing entrenched
attitudes about organizational control. That is where consensus
needs to be built: in discussions, not through edicts.
Is sharing good? asks Davenport. Not in all cases. Forcing
employees to share information with those above them can lead
to intrusive management. Some executive support systems limit
“drill down” for just this reason. Managers must think about
these types of issues in information management.
Unlimited information sharing does not work. Limits are
necessary. On the one hand, the sharing of corporate
performance figures is beneficial, especially when corporate
performance is poor, because it usually increases morale;
uninformed employees usually guess the worst. On the other
hand, the sharing of rumors (noninformation) generally
demoralizes people. Separating information from
noninformation is an information-management issue. Allowing
employees to send messages to large distribution lists
34. exacerbates the information-management problem.
Managements have awakened to the fact that they need to
address this issue. Vendors have developed filters and agents
for e-mail systems. Such responses can help resolve corporate
information-management issues, but only when the correct
underlying policies are put in place.
Even hiring practices play a role in information management. If
promotions are based on circulation and publication of new
ideas, a sharing environment exists. If these activities are not
rewarded, sharing may be anathema to the culture.
In all, getting value out of information requires more than
technology. Information is inherently hard to control. It is ever
expanding and unpredictable. Only when executives view
information in this light will they manage it for most effective
use.
Social and Ecological Issues
It is worth repeating here that the leading theme of this chapter
is how to use knowledge management to sustain individual and
business performance. This is achieved through technology-
supported learning, unlearning, and adaptation. Despite the
advances of more intelligent systems, and the willingness of
large corporations to invest billions of dollars in these
technologies, it is also important to recognize the limitations of
technologies. Data mining and other data-driven analytics have
shown useful results, but they could also lead to inconsequential
or dumb results. Human users of knowledge management
technologies should remain as the key part of knowledge quality
assurance, or at least, as educated knowledge consumers.
Today’s “intelligent” systems are certainly smarter than their
predecessors. But it would be a stretch to argue that IT can store
and distribute human intelligence and experience. The ability to
deliver the right information to the right person at the right time
in a dynamic, context-dependent concept still requires human
intelligence.
An organization can be viewed as a knowledge ecology with
35. evolving interactions between knowledge workers capable of
learning and adapting to changing situations. Therefore,
nurturing and protecting intellectual capital continue to be
central concerns for knowledge-based organizations.
The social and ecological issue here is at least twofold. First, as
knowledge, defined in its broadest sense, is widely fragmented
across networks of servers, the power that can be derived from
this knowledge is shifted to a large number of independent
stakeholders. It is difficult to predict how these people work
together or against each other in the creation and use of
intellectual capital. Furthermore, with the ease of access to
massively distributed knowledge, how do organizations bond
human talents together to create and sustain a shared vision or
common sense of purpose?WiKis
A Simple Open Source for Online Knowledge Repository
In 1994, Howard G. Cunningham started the development of a
piece of software known as the WikiWikiWeb or simply
WikiWiki, or simply Wiki for the Portland Pattern Repository.
The idea was to build an electronic forum allowing computer
programmers to exchange ideas about software development.
The technology was based on Apple’s hypercard concept
developed in the 1980s to cross-link texts and documents. One
of Cunningham’s concerns was to design a platform that users
can quickly log in and edit the text. Wiki in Hawaiian language
means “fast.” This very first Wiki now hosts tens of thousands
of pages. When knowledge is not intended to be shared, a
desktop-based Personal Wiki can be used to organize content.
The Wiki engine is a simple collaborative software installed on
a Web server or more that allows Web pages to be created and
edited using a Web browser. As information is entered in the
text by users (affectionately called wikizens), the system stores
information in a database-management system, or a content
management system. To date, there exists a rather extensive list
of Wikis systems using net-centric and open source technologies
with Java, JavaScript, PHP, Perl, VPScript, Python, and others.
36. The concept was quickly adopted by many communities, and
turned the Wiki concept into a platform for online communities
to build collective knowledge. Wikis are growing in number.
They serve as knowledge repositories, with the Wikipedia as
one of the success stories of collective and global knowledge
creation. Today, many large organizations are creating their
own context-specific Wikis for internal knowledge management.
The knowledge creation is based on trust and a strong code of
ethics to give all participants the motivation to engage the
building of the Wikis, with no malicious intent. Users can freely
add or delete content, but here are roll-back procedures to revert
to previous versions which are available Wikis as histories. In
many Wikis, contributors are requested to register so that Wikis
administrator can hold trace contact them or hold them
accountable.
From a knowledge-management perspective, the creation of
Wiki pages by the community of practice illustrates well the
concept of conversational knowledge management. In
distributed or virtual environments, individuals use a common
Internet platform to create knowledge. Unlike other forms of
information exchange or conversational knowledge such as e-
mail, instant messaging, discussion forums, or decision support
technologies, Wikis has the potential for organization to
facilitate group work—such as writing an annual report or a
business plan—without the need for meeting face-to-face. Wikis
allow some off-line conversation. However, they excel in
collaboration.
Wikis for Business Use
Wiki technology has evolved to meet business needs.
Commercial Wiki software has features that require different
levels of authorization for people to access, add, or modify
existing contents. For example, the HR department posts some
policies on a corporate Wiki and does not allow anyone to alter
the document. New Wikis also have better versioning features,
allowing the users to organize information.
37. Generally speaking, thanks to the low cost of acquisition and
use, a Wiki would be a good technology for a business that
needs to establish an intranet quickly with a reasonable level of
functionality, security, and durability. Another reason for
installing a Wiki is to allow corporate documents to be stored
and accessible through the Internet, and let employees self-
manage these documents with a minimum of effort, while
avoiding redundancy. Many businesses have successfully used
Wikis for project management and to manage and organize
meeting agenda and minutes.
Like any business application, a business-oriented Wiki requires
adequate computing resources and proper project management.
The system that hosts a Wiki should have security and data-
management tools. The organization should also appoint a staff
member to be responsible for maintaining the Wiki.
As we discuss the issue of computer ethics in the next session,
it is fitting to address a possible downside of knowledge
creation using Wikis. As documented in the literature about
group pathologies, the information, views, and opinions stored
in the Wikis might de facto—for the better or worse—the
collective wisdom. In many instances, and by its very nature, a
Wiki’s knowledge repository is built in an anarchic manner. The
issue here is that this wisdom might be incomplete and biased,
and Wiki users should be aware of how knowledge is being
created, and the context of how knowledge is being built and
rebuilt. The Economist, in its April 20069 issue, raised the
possibility of vandalism in Wikis. Despite the code of ethics
mentioned earlier and the effort of Wikis’ administrators to
enforce some quality control, there is a risk of people telling
lies. TheEconomist reports the incident of a person telling lies
on wikipedia.org. For 132 days, the lies went unnoticed and
remained on the site, until some volunteers did detective work
to trace the creator of vandalism.
Nevertheless, Wiki technologies have proved to be a flexible
tool for collaboration. The issue here for CIO or top
management leadership is to view Wiki technology as another
38. enabler for knowledge acquisition and dissemination.The Vast
Arena of Computer Ethics
To conclude this book, before looking to the future in the last
chapter, we need to address an issue that is coming more to the
fore: computer ethics. We can only touch on this vast subject,
but this brief discussion will give a flavor of the issues
involved. New technologies pose ethical issues when they open
up new possibilities for human action—individual action as well
as collective action—points out Deborah Johnson10 of Georgia
Institute of Technology, in her book Computer Ethics. Nuclear
power, the atom bomb, genetic engineering, and other
technologies raise ethical questions, as do computers; hence, the
realm of computer ethics.
A Little History
In the first era of computing, when companies and governments
used mainframes to collect personal information and store it in
huge databases, the perceived threat was invasion of personal
privacy. In the United States, that concern led to a major
privacy study in 1976. At the time, no formal rules limited
access to personal data in computers.
The second era of computing, mini- and micro-computers,
turned attention to the democratizing aspects of computers and
software and the ethical issues of property rights. Should
software be owned? What sorts of intellectual property laws
were needed to protect software owners? Such questions raised
the ire of people who did not like the idea of property rights in
software, those who believed software should be free. Issues of
property rights also raised liability issues: Who is responsible
for errors in code?
The third and latest era, the Internet, has brought “an endless
set of ethical issues,” notes Johnson, because it can be used in
so many aspects of life. Thus, all the concerns of the past have
resurfaced: privacy, the democratizing nature of the Internet,
property rights on Web sites, the concept of free speech (is
information on the Internet a form of speech or expression?),
39. and now even global property rights.
What Is Computer Ethics?
In 1985, James Moor wrote the seminal piece “What Is
Computer Ethics?”11 Moor stated that new technologies raise
ethical issues because they create policy vacuums. The ethical
issues are these vacuums. The role of computer ethics is to fill
the vacuums. Thus, areas of ethical concern include privacy,
property rights, liabilities, free speech, and professional ethics.
This notion implies that the technology appears first and the
ethics follow. It might be better for IT to follow ethics, says
Johnson, but that rarely happens in any technology. Two
possible examples are freeware and the privacy-enhancing
technology of anonymous remailers.
New technologies bring benefits and problems, which raise the
ethical issues of how to shape a technology’s use for good and
minimize its use for harm. We need to make moral choices
about how we are going to use IT, personally, organizationally,
nationally, and even globally. The central task of computer
ethics is to determine what our personal and social policies
should be, states Moor.
Johnson provides a whole host of examples of IT ethical issues.
Here are abbreviated samplings of a few of her examples to
show the breadth of this subject.
· John buys a software package to help him invest in penny
stocks. At a party, he mentions the software to Mary and she
asks to borrow it. She likes it, so she copies it and then returns
the original software to John. What did Mary do wrong, if
anything? Why is it wrong? (Intellectual property rights)
· Inga has a small business and collects customer data from her
customers directly and from their purchases. She wants to use
data-mining tools on these data to uncover patterns and
correlations among her customers. The customers gave her the
data to make a purchase; she wants to use those data for another
purpose, even though individuals will not be uniquely identified
in this use. Would she be doing anything wrong? (Privacy)
40. · Carl is a systems designer who is designing a system to
monitor radar signals and launch missiles in response to those
signals. He has become concerned that the system has not been
made secure, for one thing, and that it cannot adequately
distinguish between a missile and a small airplane, for another.
His manager dismisses his concerns. What should he do?
(Professional ethics)
· Grundner sent a message on an unmoderated listserv that
contained the phrase “wives . . . and other informationally
challenged individuals.” Mabel sent him a private message
reprimanding him for his sexist language. Grundner thought
Mabel’s message was sent to the entire listserv, so he broadcast
a message that stated that online communications transcend
barriers as long as “professional victim-mongers” do not “screw
it up.” Many members of the listserv felt Grundner’s response
was a personal attack on Mabel, and said so. Others sent
messages on gender issues. Insults spread around the listserv.
What’s wrong with this? (Flaming)
· Kimiko is a successful pension fund manager who uses an
expert system to help her make investment decisions. Her
experience tells her the market is going to turn down, so she
wants to sell stock. However, the expert system recommends
buying stock, even when Kimiko double-checks the economic
indicator data she has entered. She does not understand the
reasoning in the expert system, so she cannot check its logic.
For all she knows, it could be malfunctioning. What should she
do, buy or sell? (Accountability)
· Milo is an independent journalist and an expert on South
American politics. He subscribes to an Internet-based service
that sends him articles and news on areas of interest to him.
Upon returning from a trip, he discovers a posting that says he
is involved in illegal drug dealing and his articles protect drug
cohorts. Milo is enraged by the lie. He wants to sue for
defamation of character, but the bulletin board owner will not
give him the address of the message poster, who used a
pseudonym. So he sues the bulletin board owner instead. Are
41. bulletin board owners liable for the contents posted on their
board? (Accountability)
To address such issues, says Johnson, some people look to
traditional moral norms and apply them to the new situations.
They extend property law (copyrights, patent, and trade secret
laws) to software. Similarly, certain kinds of spoken and written
communications have traditionally been considered impolite or
confidential. The same should hold for computer-mediated
communications, some contend.
However, to apply past norms, we must first define, say, the
Internet or software, which is difficult to do when both are still
evolving. Is the Internet a highway? A shopping mall? A fantasy
world? Each would have different laws, contends Johnson,
which is one reason why computer ethics is so difficult. She
questions whether we should be treating new opportunities like
old situations. Although it is true that new uses of, say,
computers, touch familiar ethical notions, we need to ask
whether they pose new ethical issues. That is the main purview
of computer ethics. IT creates a new species of traditional moral
issues, with new variations and new twists, says Johnson.
So the question becomes, should we fill the vacuums with laws
or something else? The answer should not begin or end with
laws. Rather, we need a shared sense of what is good and just.
We need personal and institutional policies and social mores.
The ethical questions surround what people do to one another.
Therefore, they involve such concepts as harm, responsibility,
privacy, and property. In essence, says Johnson, IT creates a
new instrumentation for human action, making new actions
possible. As such, it can change the character of actions. For
example, launching a computer virus on the Internet can wreak
havoc for thousands, even tens of thousands of people and
institutions. We need to account for this change in ethics, she
contends.
Some actions are unethical only because they are illegal. Others
are unethical whether or not they are legal. Much of the
unethical behavior on the Internet is not controversial or
42. complicated. It is just criminal behavior in a new medium. It is
doing bad things in new ways. Computer ethics can thus be
thought of as a new species of general moral issues that may not
fit familiar categories. It has a global scope, which makes it
unusual, and the actions have reproducibility in that they can be
easily shared.
With this brief introduction to the realm of computer ethics, we
now look at four areas that raise ethical and legal questions.
1. Information privacy
2. Intellectual property rights
3. Legal jurisdiction
4. Online contracting
Information Privacy
Privacy includes freedom from intrusion, the right to be left
alone, the right to control information about oneself, and
freedom from surveillance. It is a major issue in today’s world
because of the widespread availability of personal data and the
ease of tracking a person’s activities on the Internet.
The United States and many other countries have enacted laws
to control certain types of personal information, such as
medical, credit, and other financial information. These laws
carry over to the online business environment. As companies
have built large databases on their online customers, the value
of these data makes selling them an attractive business option.
That is one reason the United States now has a privacy law that
requires companies to publish a description of how they treat
the personally identifiable information they handle.
Internet technologies, cookies in particular, make tracking the
browsing activities of individuals possible. Consumer concerns
about this perceived invasion of privacy now require companies
in some countries to post and adhere to privacy statements on
their Web sites.
Some companies use third-party cookies (i.e., cookies set by a
firm other than the owner of the site being visited) to do online
profiling. It is also known as profile-based advertising, and it is
43. a technique that marketers use to collect information about the
online behavior of Internet users and to facilitate targeted
advertising. Profile-based advertising could easily be
considered a form of online surveillance. What is worse, some
third-party cookies are often placed on Web browsers’
computers without their knowledge when banner advertisements
appear. It is not necessary to click on the banner ad to generate
a cookie.
Companies with cookies on their Web sites obviously want
information about their customers to make better decisions
about the types of products and services they should develop,
says Johnson. On the other side of the coin is people’s desire
for privacy; their fear of who has information about them; and
their mistrust of large, faceless organizations and governments.
Another technology that has privacy advocates concerned is
RFID. They contend that these radio-frequency sensors on
products will allow industry, governments, and thieves to
monitor personal belongings after they have been purchased. As
CNET’s News.com reports, Debra Bowen, a California state
senator, held a hearing on RFID technology and privacy to
study what sorts of regulation might be needed to protect
consumer privacy.12 One example of privacy invasion
mentioned at the hearing was, “How would you like it if you
discovered that your clothes were reporting on your
whereabouts?” Others presented other potential invasions of
privacy from RFID tags on individual consumer items.
Still others suggested protection possibilities. One was to create
a set of “fair use” guidelines for industry. One guideline might
be that companies must label products that have RFID tags.
Another might be to let consumers disable the sensors. A third
could be to allow consumers to request and see the information
collected about them from the sensors. Another suggestion was
to require legal guidelines to be in place before deploying
RFID.
Bowen has already introduced bills to regulate the use of other
technologies that might invade privacy, including face
44. recognition, data collected by cable and television companies on
consumers’ viewing habits, and shopper loyalty cards issued by
supermarkets and other chains. Bowen is not alone in her
concerns. Britain also is delving into RFID privacy issues.
However, the argument for personal information privacy has not
“won the day,” says Johnson. The following has not proven to
be a strong argument: “We control relationships by controlling
the information we give to another party. When we lose control
of our information, we lose control over how others perceive
and treat us. The loss reduces our ability to establish and
influence relationships.” The reason that this argument is not
strong is because when people must make a choice between a
social good (such as police protection) and loss of control of
information, they give up control.
A much stronger argument for the right to privacy can be made
if privacy is seen as a social good, rather than as an individual
good. This argument goes as follows, notes Johnson:
“Democracy is the freedom to exercise one’s autonomy. If the
consequences are too negative, few people will take the risk,
and democracy will diminish. For example, people act
differently when they know they are being watched. Thus,
privacy is a social good in its own right. The less privacy, the
more difficult it is to make social change. How information is
gathered, exchanged, and used affects us all, not just those who
have something to hide.”
Johnson recommends five ways to increase information privacy
protection:
1. At the national level.Treat privacy as a social good that lies
at the heart of democracy, giving its protection more weight.
Deal with privacy policy nationwide rather than on an industry-
by-industry basis, as it has been in the past. Citizens need
protection from private institutions just as much as public ones,
so include both public and private information gathering, with
an eye toward global exchange. Treat personal information as
part of the infrastructure of our society. It is better to manage
this information outside the marketplace.
45. 2. Computer professionals.Point out privacy matters to clients
when they build databases that contain personal information.
3. Technology.Use privacy protection technologies, such as
Web anonymity and tools for detecting the privacy level of a
Web site.
4. Institutions.Adopt internal policies that protect privacy, such
as restricting who can see personal information.
5. Individuals.Take personal actions to increase the privacy of
information about you.
Intellectual Property Rights
The protection of intellectual property is critical in an Internet-
based world because many products and services contain
intellectual property, copies of such items are easy to make, and
the copy is as good as the original. Examples of online
activities in which intellectual property rights are critical
include electronic publishing, software distribution, virtual art
galleries, music distribution over the Internet, and online
education.
Following are four types of legal protection of intellectual
property: copyrights, patents, trademarks, and trade
secrets.Copyrights
Copyright law aims to protect an author’s or artist’s expression
once it is in a tangible form. The work must be expressive
rather than functional; a copyright protects the expression, not
the idea. For example, a cartoon duck is an idea and cannot be
copyrighted, but Donald Duck and Daffy Duck are expressions
of that idea and are copyrighted. Registering a copyright is not
a requirement; putting the expression into tangible form is
sufficient. A copyright is valid for the life of the author plus 75
years.
Just about all original content on a Web site can be copyrighted
by the creator of the site, from buttons to video, from text to a
site layout. If a company hires someone to develop a site, by
default the copyright belongs to the developer, not the company.
The developer can then demand royalties from the company if it
46. uses the Web site; therefore, it behooves companies to clearly
define the ownership of the copyright in the contract.
The Internet raises many nontrivial issues for copyright law,
which was developed for physical media. Placing copyrighted
material, such as a photograph, on a Web site without
permission of the copyright holder is a clear violation of the
law. Less obvious is whether having a link to someone else’s
copyrighted material, say, a photograph, is a violation of
copyright law. In this case, the answer is probably yes.
However, if one includes a link to the homepage of the site
rather than a direct link to the content, then probably no
violation has occurred. Internet copyright issues are now being
worked out in courts and legislatures.Patents
Patent law aims to protect inventions—things or processes for
producing things, where “things” are anything under the sun
made by man but not abstract ideas or natural laws, according to
U.S. copyright law. Valid for 20 years, patent protection is
quite strong. In the United States, patents are granted by the
U.S. Patent and Trademark Office after stringent thresholds on
inventiveness have been met.
The United States recognizes patents for business processes.
Although software, in general, cannot be patented—it must be
copyrighted—certain business practices implemented in
software can be patented. In the e-business
area, Amazon.com has received a patent for “one-click
purchasing.” The company has enforced its patent rights against
its main competitor, Barnes and Noble. Barnes and Noble
cannot use one-click purchasing on its Web site. British
Telecom has claimed to have invented the hyperlink. To obtain
the patent, the company will have to show that no prior use of
hyperlinks occurred before its use. Any prior use would
invalidate the patent.Trademarks
Trademarks protect names, symbols, and other icons used to
identify a company or product. Trademarks can be registered
with the U.S. Patent and Trademark Office. A trademark is valid
indefinitely, as long as it is used and does not become a generic
47. name for the goods or services. The aim of trademark law is to
prevent confusion among consumers in a market with similar
identifying names or symbols. The standard for trademark
infringement is whether the marks are confusingly similar.
The biggest area of trademark conflicts in e-business has to do
with domain name registration. For a while, cybersquatters were
registering domain names that clearly referred to known
companies, realizing those companies would eventually want
the domain name and would be willing to pay for it. Although
this tactic worked for a while, anti-cybersquatting laws were
passed and the practice is now illegal. To avoid potential
problems, firms should obtain and register a trademark for its
domain name. Note that most online services that register
domain names do not check for trademark infringements. Firms
are advised to do a search for possible trademark infringements
before using a domain name, to avoid future litigation.Trade
Secrets
Trade secrets, as the name implies, protect company secrets,
which can cover a wide range of processes, formulas, and
techniques. A trade secret is not registered and is valid
indefinitely, as long as it remains a secret. Although laws
protect against the theft of trade secrets, it is not illegal to
discover a trade secret through reverse engineering. Trade
secrets are the area of intellectual property rights least
applicable to e-business.
Legal Jurisdiction
Laws are written for particular jurisdictions with clear
geographic boundaries, so how do those laws apply in
cyberspace, which has no geographic boundaries? Take, for
example, the case of trademark rights, which are limited to
geographic areas. In the physical world, a sign over “Lee’s
Computer Services” in Singapore would not have a significant
impact on “Lee’s Computer Services” in Honolulu—neither in
customers nor competition. However, in cyberspace the Web
sites of the two companies would clearly overlap and, if the
48. companies were to take advantage of the global reach of the
Internet, competitive overlap could be an issue. The companies
have little legal recourse for resolving their identical
trademarks.
Gambling provides another example. Do Hawaiian laws against
gambling apply to a Nevada company with a gambling site on
its Web server located in Las Vegas? The Attorney General of
Minnesota has asserted the right to regulate gambling that
occurs on a foreign Web page that is accessed and “brought
into” his state by a local resident.
Similar cases have involved sites dealing with pornography and
securities trading. Alabama successfully prosecuted a California
couple for bringing pornography into Alabama; their server was
in California. Note that U.S. pornography laws are based on
“community standards”; Los Angeles, California, standards are
clearly different from those of Mobile, Alabama. The state of
New Jersey is attempting to regulate securities trading over the
Internet if anyone in the state has access to it, and many states
are trying to revise their tax codes to gain revenues from e-
commerce.
At best, this trend is disturbing. At worst, it could greatly
disrupt e-business. Faced with the inability to control the flow
of electrons across physical boundaries, some authorities strive
to impose their boundaries on cyberspace. When technological
mechanisms, such as filters, fail, the authorities assert the right
to regulate online trade if their local citizens may be affected.
In essence, under this approach, all Internet-based commerce
would be subject simultaneously to the laws of all territorial
governments. Imagine a Hawaiian company setting up a Web
site for retailing over the Internet needing to consider the laws
of Hawaii, California, New York, and the other 47 states, plus
Singapore, Peru, Syria, and any other place you might name.
This situation would clearly cripple e-business.
The concepts of “distinct physical location” and “place where
an activity occurred” fall apart in cyberspace; no clear answer is
available to the question: Where did this event take place? Of
49. relevance are the locations of the business’s offices,
warehouses, and servers containing the Web sites. Some of the
uncertainty can be resolved by placing online contracts on the
site specifying the legal jurisdiction that will be used for
disputes. Users who agree to the contract designate so by
clicking a button that says “I agree.” In most cases, the contract
will hold.
In the United States, states have adopted the Uniform
Commercial Code (UCC), a wide-ranging codification of
significant areas of U.S. commercial laws. The National
Conference of Commissioners of Uniform State Law and the
American Law Institute, who sponsor the UCC, are working to
adapt the UCC to cyberspace.
Internationally, the United Nations Commission on International
Trade Law has developed a model law that supports the
commercial use of international contracts in e-commerce. This
model law establishes rules and norms that validate and
recognize contracts formed through electronic means, sets
standards governing electronic contract performance, defines
what constitutes a valid electronic writing and original
document, provides for the acceptability of electronic signatures
for legal and commercial purposes, and supports the admission
of computer evidence in courts and arbitration proceedings.
Online Contracting
A contract is a voluntary exchange between two parties.
Contract law looks for evidence that the parties have mutually
assented to the terms of a particular set of obligations before it
will impose those obligations on them. Before the law will
recognize the existence of a binding contract, there must be
· A definite offer by one party, called the offeror
· A timely acceptance by the offeree
· Some consideration must pass between the offeree and the
offeror
A widespread misconception holds that contracts must be in
writing and signed before they are enforceable in court. The
50. general rule is that offerees can show their acceptance of a
contract offer by any means that are “reasonable under the
circumstances.” Reasonable acceptance includes oral
agreements. Some exceptions do apply, however. For example,
sales of real property require signed writings and, in the United
States under the UCC, any contract for the sale of goods for a
price greater than $500 requires a signed agreement.
In e-business, evidence of acceptance of a contract can be a
simple click on a button saying “I accept” or “I agree.” The case
becomes more complex when the transaction involves payment
greater than $500. The relevant questions are: Is our purely
electronic communication “in writing” and have we “signed” the
agreement? The answers are as yet unresolved. No cases have
been presented regarding whether a file that exists in a
computer’s memory is “written” for purposes of contract law.
Most commentators think the answer is probably “yes,” but the
final answer will have to wait until courts have reviewed the
issue more closely.
In June 2000, President Clinton signed the Electronic Signatures
in Global and National Commerce Act (E-Sign). Basically, E-
Sign grants electronic signatures and documents equivalent
legal status with traditional handwritten signatures. It is
technology-neutral so that the parties entering into electronic
contracts can choose the system they want to use to validate an
online agreement. Many browsers contain minimal
authentication features, and companies are developing pen-
based and other types of technologies to facilitate online
contracting. In addition, a number of companies already provide
digital signature products using public key encryption methods.
The full impact of E-Sign may not be as revolutionary as some
would hope. The act specifies that no one is obligated to use or
accept electronic records or signatures—all parties must consent
to using the method. The act does not apply to a wide range of
situations, such as the creation and execution of wills,
adoptions, divorces, any notice of cancellation or termination of
utility services, or foreclosure or eviction under a credit
51. agreement. In addition, the marketplace has to sort out some
serious problems with varying electronic signature standards.
For example, a number of companies issue digital certificates,
but none of them can operate with the others. It would require
parties interested in adopting electronic signatures for their
business to provide several technologies or risk losing access to
some customers.
Case Example: Clickwrap Agreements
www.cli.org
On its Web site, the Cyberspace Law Institute13 offers an
interesting case. You subscribe to an electronic newsletter on a
Web site with the following text:
You may obtain a 1-year subscription to our newsletter XYZ
News for the special low price of $5.00 for each monthly issue,
simply by filling in your name and e-mail address on the form
below and then clicking the SUBSCRIBE button. By
subscribing, you agree to the terms and conditions set forth in
our Subscriber’s Contract; to read the Subscriber’s Contract,
click on CONTRACT TERMS below.
Suppose you fill in your name and e-mail address and click
SUBSCRIBE but, like most folks, you don’t actually take the
time to look at, let alone read, the Subscriber’s Contract. Do
you have a contract with XYZ?
Absolutely. You received an offer (to deliver the weekly
newsletter to you); you took a specific action that the offeror
deems to constitute acceptance of the offer (clicking on the
SUBSCRIBE button); and you agreed to pay consideration for
the contract (the offeror will deliver the newsletter to you for
$5.00 per issue).
This clickwrap contract is an example of what the law calls a
contract of adhesion—a contract that you did not really bargain
over in any way, but which was presented as more of a take-it-
or-leave-it offer. Generally speaking, adhesion contracts are
legally enforceable.
The use of the term “clickwrap contract” is an extension to the
shrinkwrap licenses used in purchased software. Mass-marketed